AWS For Dummies Ebook
AWS For Dummies Ebook
AWS For Dummies Ebook
by Ed Tittel
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
AWS Security Foundations For Dummies®, Wiz Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2023 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of
John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may
not be used without written permission. Wiz and the Wiz logo are trademarks or registered
trademarks of Wiz, Inc. All other trademarks are the property of their respective owners. John
Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For
Dummies book for your business or organization, please contact our Business Development
Department in the U.S. at 877-409-4177, contact info@dummies.biz, or visit www.wiley.com/
go/custompub. For information about licensing the For Dummies brand for products or services,
contact BrandedRights&Licenses@Wiley.com.
ISBN 978-1-394-20674-2 (pbk); ISBN 978-1-394-20675-9 (ebk)
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
Project Manager: Jen Bingham Client Acct. Mgr: Cynthia Tweed
Acquisitions Editor: Traci Martin Content Specialist: Pradesh Kumar
Editorial Manager: Rev Mengle
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
T
hese days, security professionals have an urgent need to
address potential threats and ensure safe, secure cloud
deployments. This comes with ever-increasing use of API
calls for top cloud platforms such as Amazon Web Services (AWS).
At the same time, many companies use more than one cloud plat-
form. This requires them to increase the skills and knowledge in
their security teams to cover all the bases (including the some-
times tricky interfaces used to tie multiple clouds together, and
to the data center).
Introduction 1
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Monitoring, protecting, and responding to activity:
Working in the cloud means expecting and dealing with
danger or attack, while remaining calm and collected. You’ll
learn about detection and response, data protection, and
incident handling. This book tells you what to do, and
provides examples of how to do it.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Examining security in the cloud
Chapter 1
Introduction to AWS
and Cloud Security
A
WS is short for Amazon Web Services. Though Amazon’s
roots are in the book business, it’s now best known for its
vibrant, global online marketplace and for the underlying
web and cloud infrastructures it makes available on demand to
organizations and users anywhere and everywhere.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
is inevitable. So is working with AWS (or rather APN, the AWS
Partner Network).
Protecting the data and applications that run in the cloud is key as
organizations move into and depend on the cloud to connect them
to employees, partners, customers, and supply chains. In today’s
world, insecure cloud configurations can invite breach and pos-
sibly theft or loss of data. More reasons why protecting what’s in
the cloud is central to maintaining proper security posture and
due diligence.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
helps ensure that the right people can access the right
resources under the right conditions. AWS offers a wide
range of options through which to manage machine and
human identities and their associated permissions.
»» Detection: Simply put, detection means noticing what’s
happening, especially if it involves unexpected or unwanted
configurations, or unexpected (even suspicious) behavior.
Configuration checks should occur during development and
test, prior to deployment, and then constantly in production
environments for real use. Unexpected behavior may be
detected through monitoring tools or by analyzing frequency
and type of events (such as API calls, file encryption, unusual
data deliveries, and more).
»» Data protection: Before creating or running any workload,
basic data security practices should be in use. Data classifica-
tion is a good example: It provides ways to categorize data
by its level of sensitivity. Likewise, data encryption renders it
unreadable to unauthorized access. Such practices prevent
mishandling of data, and comply with regulatory
requirements.
»» Incident response: A set of procedures and practices for
responding to (and handling, or mitigating) potential impacts
of security incidents. This is an arena where practice makes
perfect and ensures that security teams can operate as
needed during an actual incident. The key steps are to
identify and isolate the incident, contain its impact, collect
forensics to understand what happened, and to restore
operations to a known, good, working state. This means
putting tools and access in place in advance, and practicing
response through game days, penetration testing, and
adjusting to reflect lessons learned.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
identities, applications, and devices. Thus, AWS improves an
organization’s capability to meet essential security requirements,
including data protection, data locality, and data confidentiality.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Sharing security in AWS
»» Governing risk
»» Configuring AWS
Chapter 2
AWS Security
Foundations
C
loud security describes various policies, procedures, tech-
nologies, and tools used to anticipate and address security
threats in an organization. These may be internal (employ-
ees, contractors, consultants, and so forth, perhaps with an axe to
grind) or external (third-parties in search of illicit information,
profit, or advantage). Either way, organizations must prepare for
and deal with security threats and exposures, as a matter of good
practice and governance, as well as comply with regulations sur-
rounding sensitive, proprietary, and personal data.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
AWS Security Is a Shared Responsibility
Surprisingly, security in the cloud is easier because your cloud
service provider handles the physical security for the data
center (and what is shared in a shared responsibility model).
Indeed, you are still on the hook for the security of your data,
which applications, and uses. That’s why it’s so important to have
a security foundation in place. You can take advantage of physical
security and overall access controls baked in by the cloud service
provider, but you must still take responsibility for data security,
accounts and privileges, monitoring access and use, and ensuring
compliance with security policies, governance, and compliance
requirements.
FIGURE 2-1: Responsibility for cloud workloads (customer up, AWS down).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
As shown in Figure 2-1, AWS covers protection for the infrastruc-
ture that run services provided in the AWS cloud. That includes
the hardware, software, networking, and capabilities that run
AWS Cloud Services.
For example, the Amazon Elastic Compute Cloud (EC2) works like
an infrastructure-as-a-service (IaaS). This requires customers
to handle all necessary security configuration and management
tasks just as they would on any infrastructure they might operate.
As shown in the upper portion of Figure 2-1, this means manag-
ing the following (from the bottom up):
On the other side of the cloud connection, AWS covers the under-
lying cloud infrastructure, including computer, storage, database,
and networking capabilities. Beneath those abstract services,
AWS also manages — and provides security for — the underlying
regions, availability zones, and edge locations where AWS ser-
vices work and run.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Manage Risk via Governance
As a matter of best practice, organizations should separate AWS
accounts for different workloads, so they can control who has
access (and monitor what accounts are doing). This also means
establishing a strong boundary between production and test envi-
ronments, with each one distinct and apart from the other. The
same approach is good for workloads that process data with dif-
fering levels of sensitivity. That is, you don’t want to mix accounts
that handle sensitive data with those for more routine and mun-
dane tasks.
At the same time, when accounts are set up, preventative poli-
cies help keep things properly scoped and controlled. You can
limit accounts to specific services, regions, and service action. For
example, a user account can access specific services as defined
by an administrator, such as launching EC2 instances. That user
would be denied access to other services not specifically allowed,
such as reading data from a particular database.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
For more information on the topics covered in this chapter please
consult the following online assets:
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Keeping your network safe
Chapter 3
Secure Your AWS
Infrastucture
Z
ero trust is a key concept in modern cybersecurity approaches.
It’s a logical extension of the notion of trust no one.
Essentially, zero trust requires any and all users to first
authenticate, then obtain authorization, and finally obtain con-
tinuous validation for security purposes before they are granted
(or keep) access to applications and data.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Protect Your Networks
Infrastructure protection is necessary to follow best security prac-
tices, as well as to meet an organization’s obligations in terms of
policy, governance, and compliance. Following such protection
practices is essential for successful, ongoing cloud operations,
just as it is for other aspects of proper security.
FIGURE 3-1: An example AWS VPC, with a subnet for each availability zone in
a region (EC2 instances for each subnet, and an Internet gateway for all).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
If your cloud environments use numerous VPCs (more than
dozens) you’ll want to put an AWS Transit Gateway in place. It
can route all traffic to and from virtual networks for thousands
of VPCs, with a single interface through which to manage and
monitor all connections. For more info see https://aws.amazon.
com/transit-gateway.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
an EC2 instance, it will control inbound and outbound traffic for
that instance. Security groups may be associated with resources
only in the VPC for which they’re created. Security groups can be
set up for load balancers, web, and database servers.
Each VPC comes with a default security group, but you can create
additional such groups for any VPC (no added charges). Web serv-
ers can have public subnets (to support Internet access), while
database servers can have private subnets (so only authorized
applications or users can access them, and only database requests
from the web server could be allowed).
AWS WAF integrates with AWS Shield Advanced (no extra charge).
It offers easy setup, low overhead for ongoing operation, mini-
mal latency impact, and fully customizable security. It even uses
advanced automation to analyze web logs and identify malicious
activity and it updates security rules on its own.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
AWS Shield also detects and handles challenging Distributed
Denial of Service (DDoS) events, and can customize application
protection against such risks through integrations with AWS
Shield Response Team (SRT) Protocols or AWS WAF rules. For
more information visit https://aws.amazon.com/shield.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In general, the guiding principle to protect software and data
running within various AWS environments (IaaS, EC2 instances,
containers, virtual servers, and more) is to reduce the exposed
attack surface as much as possible. In addition to detecting and
handling vulnerabilities, it’s also good practice to harden Amazon
Machine Images (aka AMIs) for further protection. AWS offers
a guide to what’s involved entitled “Best practices for building
AMIs” (search on that title for easy access).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Best practices for AWS automation are many and varied. At a
minimum, the fundamental principal involved is easily described
as “automate everything.” Such automation must include use of
patch management and deployment tools for AMIs of all kinds,
especially EC2 instances, containers, OS images, and so forth. See
the “Best Practices and recommendation” section of “AWS Pre-
scriptive Guidance” for more information (search on that latter
title for quick access to this helpful document).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Establishing and verifying identities
Chapter 4
Securing Identities
and Permissions
I
n the world of cybersecurity, matters of identity and access
management (aka permissions) is usually abbreviated as
IAM. IAM is a whole subdiscipline that embraces multiple tech-
nologies and business processes. The guiding principle for IAM is
“get things right” — that is, make sure the right accounts (peo-
ple, processes, or machines) access the right assets for the right
reasons at the right time. Not incidentally, IAM also seeks to deny
unauthorized access and thereby defeat attempts to breach secu-
rity and steal information.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
AWS and IAM
If you want to use AWS services, your users and applications
must be granted explicit access to resources in one or more AWS
accounts. Given typical situations with hundreds or thousands of
AWS workloads running, organizations need serious and robust
identity management and permissions in place.
That’s how you “get things right” in the IAM arena. This means
the right parties (people, processes, and machines) can get
into the right assets (the resources they’re allowed to see and
use) for the right reasons (items for which they have a legitimate
need) at the right time (while systems and services are available
to authorized users).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
identities typically include EC2 instances or AWS Lambda
functions. AWS also permits machine identities for external
processes that need access, along with machines outside
AWS that need AWS access.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
multiple locations and services. This supports creating,
managing, and revoking access from a single point of
control. A default identity store, to manage users and
groups, lets you configure an identity provider one time,
then grant access to existing and new accounts managed
within the organization.
»» Leverage user groups and attributes: With users in large
numbers, it’s much easier to organize them into groups to
manage them at scale. Users with common security require-
ments belong in the same group, which makes those
requirements easier to manage and update for access
control.
Use groups and attributes to control access, not individual
user accounts. This approach sustains central access manage-
ment by using group memberships or attributes, not individ-
ual policies as users’ access needs change. AWS IAM Identity
Center provides extensive user group and attribute set-up
and management capabilities.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
permissions to specific human and machine identities (most
often, through membership in security groups) permissions con-
trol access to specific actions on specific resources.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
SCPs provide central access controls for all IAM entities in AWS
accounts. Use them to enforce permissions everyone in the orga-
nization should follow. With SCPs, developers can be granted
freedom to manage their own permissions because their accounts
operate within the boundaries defined for them.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Logging services and applications
Chapter 5
Dealing with Danger
A
s the now-obligatory “scary statistics” section in any cur-
rent cybersecurity report can attest, there’s plenty of rea-
son for concern — if not outright alarm — with the state
of things. Take the Wiz blog “State of the Cloud 2023” as an
example to assess how things look from that lofty perch at the
moment.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Configure Logging for Services
and Applications
The key to dealing with danger is to keep an eye on what’s hap-
pening in the world around you. For AWS environments, that
means enabling and configuring service and application logging.
Such logs can be collected and aggregated across all AWS Organi-
zation elements.
AWS Config is another Amazon tool that lets you assess, audit,
and evaluate configurations for AWS resources. It continuously
oversees and records configuration changes to simplify change
management. At the same time, it audits and evaluates resource
configurations against your policies. Config also helps simplify
operational troubleshooting by correlating configuration changes
to account events. This is vital to security and helps fend off
reconnaissance and stymie attacks. Config can also compare cur-
rent configurations to pre-defined “ideal” configurations to let
you know when changes might degrade performance or security.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Overall, AWS makes it easy to aggregate and centralize security
information from a range of security tools and platforms. The
idea is to create a comprehensive view of the state of security,
and to provide visualizations and dashboards to make it easy to
assess and respond to security situations in real time (or as close
as technology and automation can get). The Amazon Security Hub
tool centralizes security alarms and alerts, and provides a consis-
tent and coherent view of security, including means to:
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 5-1: AWS Security Hub consolidates and coordinates inputs across a
range of security tools, does automated checks, and responds or remediates
when it can.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Thus, Security Hub provides alerts against threats and miscon-
figurations. It can also run automated response and mitigation
routines as and when they’re available, to handle known (or sus-
pected) attacks or suspicious actions. Taking action on security
findings includes identifying and setting status for associated
workflows, and sending inputs to already-defined custom actions.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
More AWS Resources
Please consult the various links mentioned earlier in the chapter
to learn more about tools and technologies covered therein. For
more AWS security insight on detection and response, please visit
any or all of these items as well:
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Classifying data, especially sensitive stuff
Chapter 6
Protect Your Data
T
hink about what delivers value to information technology.
Sure, lots of hardware is involved. And software plays an
important role in getting things done (especially custom-
or purpose-built code that implements intellectual property). But
the real crown jewels in any organization reside in its data. Data’s
what describes your customers or clients, tracks their history and
interactions, and captures their interests and trends. Data’s also
what drives supply chains, financial activities for both sales and
purchasing, and a whole lot more. It’s where your business lives,
and how it breathes and grows.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A brief summary of scary statistics for data breaches in 2023
goes as follows. Average cost: $4.35 million. Major root cause
for breaches: phishing (22 percent of cases). Seventy-nine
percent of critical infrastructure organizations (such as cloud
providers) did not adhere to zero trust approaches to security.
Cloud-based breaches account for 45 percent of the total, with
30 precent of all large breaches in hospitals. For a plethora of more
info, visit https://www.getastra.com/blog/security-audit/
data-breach-statistics/.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
business processes, where it’s stored, and who owns it.
Legal and compliance requirements and enforced controls
should appear, too. Identification is a first vital step toward
classification and protection. At this stage, you can move
toward automating the data-discovery process, and make
use of tools to recognize and call out sensitive data (PII,
account or credit card information, health data, intellectual
property, and so forth). On the tools side, take a look at “AWS
Glue DataBrew” a visual data preparation tool (search for
that string to learn more).
»» Define data protection controls: These are based on
classification levels. A whole laundry list of approaches
helps this process — namely, resource tags, separate AWS
accounts per sensitivity, IAM policies, SCPs, and more. Given
a classification scheme, you can discover security controls
within AWS services to apply relevant security and protection
controls. For each such service, turn to its security section in
the AWS Documentation for details (see https://docs.
aws.amazon.com/ to get started).
Controlling access to AWS resources works well using tags
(including IAM resources). Tags can be attached to a
resource itself, or passed in a service request that accepts
tag data. Tags can be a big help in controlling access to AWS
resources. For more information, visit https://docs.aws.
amazon.com/IAM/latest/UserGuide/access_tags.html.
»» Automate identification and classification: Once defined,
the best way to use technology for consistent, reliable data
handling is by automating these activities. Amazon Macie
(see next section heading) can provide such capabilities,
using machine learning to automatically discover, classify
and protect sensitive data.
»» Define data lifecycle management: A data lifecycle
strategy derives from its sensitivity, legal, and policy
requirements. This includes data retention periods, the
data destruction process, data access management, data
transformation, and data sharing considerations. Data
classification methods balance usability against access
(as is the general case for information security). Multiple
levels of access must be secure, but still usable, to work well.
Finally, users should come from trusted network paths and
require access to decryption keys.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
DOING DATA DISCOVERY
If you view data as an organizational asset, it doesn’t really belong to
individuals or departments anymore. Analyzing all the data provides
profound insights into the types and kinds of data the organization
uses, and what its value, risks, and handling requirements should be.
That’s what data discovery is all about. It generally follows these five
distinct steps:
To read about this process in more detail, and learn about tools and
techniques to implement and automate it, please visit https://
docs.aws.amazon.com/wellarchitected/latest/analytics-
lens/characteristics.html.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
From left to right, you can track what’s involved in setting up
and using Macie to deal with sensitive data. Once enabled, Macie
goes to work. It automatically generates and maintains S3 bucket
inventory, with insights into bucket-level security and access
controls. It builds and maintains an interactive map of sensitive
S3 data. You can order targeted data discovery jobs based on the
map at any time. Macie can generate findings and pass them to
Amazon EventBridge or AWS Security Hub for automated remedi-
ation and workflow integration (where available).
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
AWS supports these best practices in its services and related
toolsets. It describes “protecting data at rest” in its Security
Pillar documentation. This includes how to implement secure key
management, enforce encryption at rest, automate data at rest
protection, enforce access control, and more. For data in transit
a similar wealth of topics exists — namely implement secure key
and certificate management, enforce encryption in transit, auto-
mate detection of unintended data access, and authenticate net-
work communications.
Behind the scenes, the AWS Key Management Service and the AWS
Certificate Manager provide supporting infrastructure for orga-
nizations that need them. As always, AWS Services also readily
integrate with APN equivalents to accommodate existing invest-
ments. AWS service users should also follow best practices that
include using and configuring secure protocols (for example. TLS,
IPSec, and so forth), and using a Virtual Private Network (VPN) to
secure external connections.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding incident response
Chapter 7
Respond to (and
Mitigate) Incidents
I
n security-speak, incident is a polite euphemism for an attack,
attempted or successful. Incidents sometimes happen — and
when they do, organizations must be ready to deal with them.
That drives incident response.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Prepare the Response Team
It’s essential to have both incident response teams and incident
response plans in place before an incident occurs. Indeed, there’s
a whole laundry list of stuff involved in doing incident response
right. Let’s march through, and look it over:
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
AWS Incident Detection and Response offers round-the-clock
proactive monitoring and incident management. It helps lower
failure risks and accelerate recovery. It also offers access to
AWS experts for detection, response, and recovery assists. For
more info, visit https://aws.amazon.com/premiumsupport/
aws-incident-detection-response/.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
for the collection, preservation, and presentation of evidence in
court (or to meet compliance requirements) to show exactly what
happened, when, to what.
FIGURE 7-1: GuardDuty, Security Hub, and other tools and facilities work
together to create a defensible chain of evidence from AWS services data.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A response team often combines tools — such as AWS Systems
Manager, Amazon EventBridge, and AWS Lambda (among others,
see Figure 7-1) — to grab forensics inside an OS and VPC traf-
fic mirroring for packet captures and other nonpersistent stuff.
Other typical activities include log analysis and disk image analy-
sis, run inside a special security account with access to forensics
workstations and tools.
An Ounce of Pre-provisioning
Incident response and forensics teams need special access to
AWS services, and their activities must be audited to make sure
the “watchers get watched.” Indeed, AWS warns against “reli-
ance on long-lived credentials . . . in favor of temporary” ones.
For management tasks — including response team roles — AWS
recommends implementing identity federation and temporary
escalation for admin access. This means a response team member
requests elevation to higher role, and that goes to someone with
approval authority. Once approved, the requester gets and uses
a set of temporary credentials to tackle incident response. After
those temporary credentials expire, a new request must start this
cycle over again.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Simulation Is Key to Success
For incident handling, practice is just as important as planning,
preconfiguring and predeploying tools for incident responders.
That’s because experience leads to familiarity and understanding
so that responders can concentrate on doing the job when an inci-
dent occurs (rather than remembering what that job is, where to go,
what to do, who to call, and so forth). Practice is as good for incident
responders as it is for first responders of other kinds. Indeed, police
and firefighters practice all the time, as a key element of their jobs.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 8
Ten Tips to Securing a
Multi-Cloud Network
O
rganizations with a multi-cloud environment, often need
one tool to automate security across all clouds. In such
situations, a cloud native application protection platform,
or CNAPP, tool helps them secure the multi-cloud environment.
Here are the top ten key capabilities a CNAPP solution should have
to protect your multi-cloud environment:
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Deep risk assessment: CNAPP means you need only one
tool to cover risk assessment across all vulnerabilities,
network exposures, secrets, malware, identities, and
sensitive data everywhere. Thus, all risks get correlated
to identify toxic combinations in a complex environment
where such risks are otherwise hard to identify — and hard
to address.
»» Fully contextualized risks: CNAPP provides a graph-based
context surround to identify and categorize risks. This
provides an end-to-end view and improved understanding
of risk across the whole enterprise.
»» Prioritization of risks: CNAPP offers a prioritized queue of
risks so security and incident teams can focus on the most
important ones, and tackle them in proper order.
»» Project segmentation and RBAC support: CNAPP provides
developers with ownership and visibility into the security of
their resources, through role-based access control (RBAC)
and project segmentation.
»» Identify risks early in the development cycle: Integrate
security checks into the development pipeline by scanning
IaC templates to identify misconfigurations before they
get into production. CNAPP automates such checks into
development environments as built-in parts of that
workflow.
»» Automatic remediation: CNAPP supports automatic
remediation where possible. This saves time in responding
to issues. It also sends alerts to the right people by integrat-
ing whatever tool(s) you use into your existing ticketing
system.
»» One tool to support your cloud journey: A fully integrated
CNAPP solution allows organizations to start with one
specific security tool such as vulnerability management.
Later, they can add more security capabilities as they grow.
This might include Kubernetes security posture manage-
ment to give them one solution for their entire cloud needs.
It can also include a broad range of security intelligence,
monitoring, and graphic capabilities. Cross-site security
checks also become relatively simple and straightforward.
These materials are © 2023 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.