Areas of Responsibility of AWS
Your Areas of Responsibility
AWS Compliance Program
Cloud Security Domains
The CIAs of Security
AWS Network Security
- AWS networks and exposed public API endpoints protect clients against the attacks like Distributed Denial Of Service (DDoS) attacks for which standard DDoS mitigation techniques are syn cookies and connection throttling, Man-in-the-Middle attack for which Public API endpoints are protected by SSL requiring server authentication and Other Tenants’ Packet Sniffing in which you can place your virtual interfaces into promiscuous mode trying to capture other tenants’ network traffic. AWS infrastructure, however, will not deliver any traffic to such interfaces. Still, customer is responsible for encrypting any sensitive traffic. Address Resolution Protocol cache poisoning is also blocked.
AWS Network Security (Cont’d)
The Heartbleed OpenSSL Bug
Notes:
Sample of AWS Security Advisory for Amazon EC2
From: Amazon Web Services, Inc. <no-reply-aws@amazon.com>
Date: Wed, Apr 9, 2014 at 4:06 AM
Subject: AWS Security Advisory for Amazon EC2
To: XXXX
Dear Amazon EC2 Customer,
The OpenSSL project has recently announced a security vulnerability in OpenSSL affecting versions 1.0.1 and 1.0.2 (CVE-2014-0160). Customers that are running Linux and are using SSL could be affected by this issue and should upgrade to a fixed version as soon as possible.
If you’re using the Amazon Linux AMI, you can simply run “sudo yum update openssl”, and then restart any services using OpenSSL to protect any at-risk instances.
Find more details and update instructions from the websites of your Linux vendor of choice:
* Amazon Linux AMI: https://aws.amazon.com/amazon-linux-ami/security-bulletins/ALAS-2014-320/
* Red Hat: https://rhn.redhat.com/errata/RHSA-2014-0376.html
* Ubuntu: http://www.ubuntu.com/usn/usn-2165-1/
Please note that several of the prominent Linux operating systems have released fixed packages that still bear the OpenSSL 1.0.1e name. Even though the OpenSSL project released 1.0.1g as their newest software, downstream Linux providers have in some cases elected to include just the fix for CVE-2014-0160 in their packages in order to provide a small update quickly. Updates to 1.0.1g are likely to come later.
For more information about this vulnerability, please visit
* AWS Security Bulletin page: https://aws.amazon.com/security/security-bulletins/
* OpenSSL’s official advisory: https://www.openssl.org/news/secadv_20140407.txt
* The Heartbleed Bug: http://heartbleed.com/
Thank you,
AWS Security
Amazon Web Services, Inc. is a subsidiary of Amazon.com, Inc. Amazon.com is a registered trademark of Amazon.com, Inc. This message was produced and distributed by Amazon Web Services Inc., 410 Terry Ave. North, Seattle, WA 98109-5210
Authentication & Authorization: AWS Identity and Access Management Service
Notes:
IAM enables secure access to AWS services and resources for users. It also enables the creation and management of users in AWS, and the granting of access to AWS resources for users managed outside of AWS.
This enables the use of existing corporate identities to grant secure and direct access to AWS resources, such as S3 buckets, without creating a new AWS identity for those users.
AWS Account Security Features
Controlling Programs: Mandatory Access Control (MAC)
Notes:
AppArmor is a Mandatory Access Control (MAC) system which is a kernel (LSM) enhancement to confine programs to a limited set of resources. AppArmor’s security model is to bind access control attributes to programs rather than to users. AppArmor confinement is provided via profiles loaded into the kernel, typically on boot. AppArmor profiles can be in one of two modes: enforcement and complain. Profiles loaded in enforcement mode will result in enforcement of the policy defined in the profile as well as reporting policy violation attempts (either via syslog or auditd). Profiles in complain mode will not enforce policy but instead report policy violation attempts.
AppArmor is different from some other MAC systems on Linux in that it is path-based, allows for mixing of enforcement and complain mode profiles, uses include files to ease development and has a far lower barrier to entry than other popular MAC systems.
Core AppArmor functionality is in the mainline Linux kernel from 2.6.36 onwards; work is ongoing by AppArmor, Ubuntu and other developers to merge additional AppArmor functionality into the mainline kernel. [Source: https://wiki.ubuntu.com/AppArmor ]
Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defense–style mandatory access controls (MAC).
Access Control: Physical Security
Access Control: Auditing
Security Best Practices
Notes:
Encryption in-place – data should be encrypted so as to protect confidentiality and integrity in case of a data breach.
Encryption in-transit – data should be encrypted when moved around (particularly between zones) to protect against disclosure due to man-in-the-middle attacks.
Strong authentication between system components – data should only be delivered to known participants.