Summary

  • Shared Responsibility on AWS

  • Shield: Automatic DDoS Protection + 24/7 support for advanced

  • WAF: Firewall to filter incoming requests based on rules

  • KMS: Encryption keys managed by AWS

  • CloudHSM: Hardware encryption, we manage encryption keys

  • AWS Certificate Manager: provision, manage, and deploy SSL/TLS Certificates

  • Artifact: Get access to compliance reports such as PCI, ISO, etc...

  • GuardDuty: Find malicious behavior with VPC, DNS & CloudTrail Logs

  • Inspector: find software vulnerabilities in EC2, ECR Images, and Lambda functions

  • Network Firewall: ProtectVPC against network attacks

  • Config: Track config changes and compliance against rules

  • Macie: Find sensitive data (ex: PII data) in Amazon S3 buckets

  • CloudTrail: Track API calls made by users within account

  • AWS Security Hub: gather security findings from multiple AWS accounts

  • Amazon Detective: find the root cause of security issues or suspicious activities

  • AWS Abuse: Report AWS resources used for abusive or illegal purposes

  • Root user privileges:

    • Change account settings

    • Close your AWS account

    • Change or cancel your AWS Support plan

    • Register as a seller in the Reserved Instance Marketplace

  • IAM Access Analyzer : identify which resources are shared externally

Last updated