{"id":12428,"date":"2022-05-31T13:38:40","date_gmt":"2022-05-31T13:38:40","guid":{"rendered":"https:\/\/blog.cloudthat.com\/?p=12428"},"modified":"2024-06-25T10:59:27","modified_gmt":"2024-06-25T10:59:27","slug":"explore-security-identity-logging-services-aws-features","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/explore-security-identity-logging-services-on-aws-and-their-features","title":{"rendered":"Explore Security, Identity, Logging Services On AWS And Their Features"},"content":{"rendered":"<table style=\"height: 255px;\" border=\"3\" width=\"368\">\n<tbody>\n<tr>\n<td>\n<h2><span style=\"color: #000080;\"><strong>TABLE OF CONTENT<\/strong><\/span><\/h2>\n<\/td>\n<\/tr>\n<tr>\n<td><a href=\"#introduction\">1. Introduction<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#identityandaccessmanagement\">2. Identity and Access Management (IAM)<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#topfeaturesofiam \">3. Top Features of IAM<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#iaminternals\">4. IAM Internals <\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#cloudtrail\">5. AWS CloudTrail<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#awsshield\">6. AWS Shield<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#awswaf\">7. AWS WAF<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#conclusion\">8. Conclusion <\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"#aboutcloudthat\">9. About CloudThat<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"introduction\">1. Introduction<\/h2>\n<p>In my previous blog, we discussed the security aspects of an application and network for your<a href=\"https:\/\/blog.cloudthat.com\/all-you-need-to-know-about-application-infrastructure-security-with-aws-services\/?utm_source=blog-website&amp;utm-medium=text-link&amp;utm_campaign=all-you-need-to-know-about-application-infrastructure-security-with-aws-services\"><strong> infrastructure and steps to implement AWS services to achieve the desired goal.<\/strong><\/a> Today, we will learn in detail about all these services and explore their top features and benefits.<\/p>\n<h2 id=\"identityandaccessmanagement\">2. Identity and Access Management (IAM)<\/h2>\n<p>When we create an AWS account for the first time, we will begin with an AWS account\u00a0root user that has full access to all AWS services and resources present in the AWS account. This\u00a0root user can be accessed by logging in with the email address and password while creating the AWS account. It is recommended not to use the AWS root user for our daily tasks, even the administrative functions. Instead, we adhere to the\u00a0best practice of using a root user only to create our first IAM user.<\/p>\n<h2 id=\"topfeaturesofiam\">3. Top Features of IAM<\/h2>\n<p>IAM provides the following features:<\/p>\n<ul>\n<li><strong>Shared access to your AWS account<\/strong><\/li>\n<\/ul>\n<p>We can grant access permission to other people to administer and use resources in our AWS account without any need to share our password or access key.<\/p>\n<ul>\n<li><strong>Granular permissions<\/strong><\/li>\n<\/ul>\n<p>We can grant different permission levels to other people to access various resources. As an example, we can provide some users with permission to have complete access to Elastic Compute Cloud (Amazon EC2), Amazon Virtual Private Cloud (Amazon VPC), Simple Storage Service (Amazon S3), and other AWS services. While for the other users, we can grant access with read-only access to Amazon VPC, provide permission to administer just some EC2 instances, or access billing information and nothing else.<\/p>\n<ul>\n<li><strong>Secure access to applications that run on Amazon EC2 <\/strong><\/li>\n<\/ul>\n<p>We can use AWS IAM features to provide credentials for the applications on EC2 instances securely. We can use these credentials to provide permissions to our application to access other AWS resources or services like S3 buckets and DynamoDB tables.<\/p>\n<ul>\n<li><strong>Multi-factor authentication (MFA)<\/strong><\/li>\n<\/ul>\n<p>We can add two-factor authentication to our AWS account and individual users for extra security. With MFA enabled, you or your users must provide a password or access key to log in to your AWS account and a code from the configured MFA device.<\/p>\n<ul>\n<li><strong>Identity federation<\/strong><\/li>\n<\/ul>\n<p>This feature allows users to have passwords elsewhere to get temporary access to our AWS account, for example, in a corporate network or an internet identity provider.<\/p>\n<ul>\n<li><strong>Free to use<\/strong><\/li>\n<\/ul>\n<p>AWS Security Token Service (AWS STS) and AWS Identity and Access Management (IAM) are AWS account features offered at no additional charges. We will only get charged when using other AWS services with our IAM users.<\/p>\n<h2 id=\"iaminternals\">4. IAM Internals<\/h2>\n<p>IAM is responsible for below mentioned two processes:<\/p>\n<ul>\n<li>Authentication\u200a\u2014\u200aare you the correct user you claim to be?<\/li>\n<li>Authorization\u200a\u2014\u200aare you allowed to perform such actions?<\/li>\n<\/ul>\n<p>IAM has a lot of internal items:<\/p>\n<ul>\n<li><strong>Users<\/strong>\u200a are entities with the console login and password, API key or secrets, and other security credentials.<\/li>\n<li><strong>Groups<\/strong> \u2014IAM Groups are used to manage the permissions for multiple entities as a single entity.<\/li>\n<li><strong>Roles<\/strong>\u200a\u2014\u200awhile the IAM group can delegate permissions to users, IAM Roles can manage permissions to entities like Lambda functions, EC2 instances, etc.<\/li>\n<li><strong>Policies<\/strong>\u200a are \u200aa set of permissions assigned to a user, group, or role.<\/li>\n<\/ul>\n<h3 id=\"iamusers\">IAM Users<\/h3>\n<p>An AWS user is an account within an account. Being the owner of our AWS account, we can create new users that can provide access to different AWS resources like EC2 or S3, or ELB. In addition, we can assign access policies to the account\u00a0and generate passwords and security credentials. Once we\u2019ve forwarded login details to our team members, they will have everything necessary to start work.<\/p>\n<h3>Protecting our Root User Account<\/h3>\n<p>It is strongly recommended to lock down our root AWS account and use a regular user account for your day-to-day activities. By\u00a0lockdown,\u00a0we mean to do the following:<\/p>\n<ul>\n<li>Create a strong password and store it in a safe place<\/li>\n<li>Create a user with somewhat limited power<\/li>\n<li>Delete our root access keys (to prevent anyone from accessing and hijacking our root account)<\/li>\n<li>Avoid logging in to the console using the root account<\/li>\n<\/ul>\n<p>The root user has full access and control of the AWS account. Someone with hostile intentions gets hold of our root user\u2019s password, and the entire infrastructure is compromised. An IAM user, on the other hand, starts with no powers of any sort to perform an action. We can assign whatever permissions it will need to get its job done, but its reach is limited, which means an attack against it won\u2019t necessarily be catastrophic.<\/p>\n<h3>IAM Groups<\/h3>\n<p>IAM groups allow the grouping of users and delegating permissions to users. But groups don\u2019t have their access credentials. Instead, any user who has been added to a group will use their own credentials to access the resources permitted by group policies.<\/p>\n<h3>IAM Roles<\/h3>\n<p>Access for individual users can be defined by managing users and groups. However, permissions and rights can also be assigned to objects like EC2 instances and applications through\u00a0roles.<\/p>\n<p>A role is an identity with specified restrictions and permissions as a user and not the property of any user. The user privileges cannot be reached through regular login methods. Instead, an object, once properly authenticated, can temporarily switch to a role\u00a0whose access policies are applied to the user, replacing any rights or restrictions that may have previously been applied.<\/p>\n<h3>IAM Policies<\/h3>\n<p>An IAM policy defines clearly who may perform which actions and on what resources. For example, the policy code shown in the figure permits a specific user, Steve, with a unique Amazon Resource Name (ARN) identifier as Principal \u2014 to put objects into S3 bucket called the design team. The Action = put permission, and the ARN on the Resource line depicts the S3 bucket. The actual permission is enabled through the value given to Effect = Allow.<\/p>\n<h3>Multi-factor Authentication (MFA)<\/h3>\n<p>AWS (MFA) provides an added layer of security on top of the AWS Credentials. With MFA enabled, users can log in to their AWS account using AWS Management Console. They need to provide their username and password and an authentication code generated by their AWS MFA device, which they have registered. These multiple factors for authentication increase our AWS account&#8217;s security and the AWS resources we have created.<\/p>\n<p>MFA can be enabled for our AWS account and as well as for individual IAM users that we have created in our AWS account. MFA is not chargeable.<\/p>\n<h3><strong>Need for AWS Multi-Factor Authentication<\/strong><\/h3>\n<ul>\n<li>MFA helps to prevent unauthorized access to the AWS account<\/li>\n<li>Root accounts and IAM users can be protected using MFA<\/li>\n<li>If the password got compromised, the AWS account would be safe<\/li>\n<li>When MFA is enabled for the root user, it only affects the root user credentials. IAM users are treated as individual identities in the AWS account with their individual credentials, and each personal identity can have its MFA configured<\/li>\n<\/ul>\n<h3><strong>AWS Device Options for MFA<\/strong><\/h3>\n<p>Below devices are supported as MFA devices in AWS:<\/p>\n<ul>\n<li>Virtual MFA Device:\u00a0It provides support for multiple tokens on a single device like\u00a0Google Authenticator\u00a0(Only for Phones), Authy\u00a0(For Multi-Device)<\/li>\n<li>Universal 2nd Factor (U2F)\u00a0Security Key:\u00a0Supports multiple roots and IAM users using a single security key. e.g.,\u00a0Yubikey\u00a0by Yubico (Third Party)<\/li>\n<li>Hardware Key for MFA Device:\u00a0Provided by Gemalto (Third Party)<\/li>\n<\/ul>\n<h3 id=\"cloudtrail\">5. AWS CloudTrail<\/h3>\n<p>AWS CloudTrail is an auditing, governance, and compliance monitoring service offered by Amazon Web Services (AWS). It falls under the \u201cManagement and Governance\u201d tool in AWS.<\/p>\n<p>With CloudTrail enabled, AWS account owners can record and keep a log of every API call made for each resource in the AWS account. An API call can be made:<\/p>\n<ul>\n<li>When a resource is being accessed from the AWS management console<\/li>\n<li>when trying to access resources by using AWS CLI<\/li>\n<li>whenever there is a REST API call made to an AWS resource<\/li>\n<\/ul>\n<p>These actions can be taken from:<\/p>\n<ul>\n<li>Human users (like when a user is trying to spin up an EC2 instance from the AWS console)<\/li>\n<li>Applications (like when a bash script calls an AWS CLI command)<\/li>\n<li>another AWS service (like when a Lambda function is writing to an S3 bucket)<\/li>\n<\/ul>\n<p>We can perform analysis on the logs as CloudTrail saves the API events in a secured and immutable format.<\/p>\n<p><strong>AWS CloudTrail is enabled for all users by default.<\/strong><\/p>\n<h3>AWS CloudTrail Features<\/h3>\n<p>Amazon CloudTrail has many features which a monitoring and governance tool can expect. Below are the features:<\/p>\n<ul>\n<li>AWS CloudTrail is \u201cAlways On\u201d and allows you to access the most recent data from 90 days<\/li>\n<li>It provides event history to check the changes made to the AWS account<\/li>\n<li>It provides a multi-region configuration<\/li>\n<li>It provides Log file integrity validation and encryption<\/li>\n<li>Data events, management events, and CloudTrail Insights<\/li>\n<\/ul>\n<h3>CloudTrail Event History<\/h3>\n<p>CloudTrail is enabled by default when an AWS account is created, so AWS account administrators don\u2019t have to enable CloudTrail manually. CloudTrail is the default trail provided by AWS. All the information in the CloudTrail is kept for 90 days in a rolling fashion.<\/p>\n<h2 id=\"awsshield\">6. AWS Shield<\/h2>\n<p>AWS Shield is a managed service that protects from Distributed Denial of Service (DDoS) attacks for applications running on AWS. It provides always-on detection and automatic inline mitigation that minimizes application downtime and latency, so there would be no need to engage the AWS Support to benefit from DDoS protection.<\/p>\n<p>AWS Shield Standard helps to protect your application from the most common attacks occurring at network and transport layer DDoS attacks that target your website or applications<\/p>\n<h3>Benefits of AWS Shield<\/h3>\n<ul>\n<li>It provides Seamless integration and deployment to our application.<\/li>\n<li>It provides customizable protection from attacks.<\/li>\n<li>It provides Managed Protection and Attacks Visibility<\/li>\n<li>Using AWS Shield is cost-efficient<\/li>\n<\/ul>\n<p>Shield Advanced protection can also be added for the following resource types:<\/p>\n<ul>\n<li>AWS CloudFront<\/li>\n<li>AWS Route 53 hosted zones<\/li>\n<li>AWS Global Accelerator accelerators<\/li>\n<li>Elastic Load Balancing (ELB) load balancers<\/li>\n<li>AWS EC2 with Elastic IP addresses<\/li>\n<\/ul>\n<h2 id=\"awswaf\">7. AWS WAF<\/h2>\n<p>AWS WAF is a web application firewall and helps protect your web application or APIs against the common web exploits and other bots that may affect availability, compromise security, or even consume excessive resources. AWS WAF gives you control over how the traffic reaches your application by enabling you to create a few security rules that control both traffic and block common attack patterns, like SQL injections or cross-site scripting.<\/p>\n<p>After creating an AWS WAF web access control list (web ACL), create, or update web distribution to associate distributions with the web ACL. You can also associate as many CloudFront distributions as you want with the same web ACL or different web ACLs.<\/p>\n<h3>Benefits of WAF<\/h3>\n<ul>\n<li>Agile protection against web attacks<\/li>\n<li>Save time with managed rules<\/li>\n<li>Improved web traffic visibility<\/li>\n<li>Ease of deployment &amp; maintenance<\/li>\n<li>Easily monitor, block, or rate-limit bots<\/li>\n<li>Security integrated with how you develop an application<\/li>\n<\/ul>\n<p>Learn more about <a href=\"https:\/\/blog.cloudthat.com\/aws-web-application-firewall-an-overview-and-step-by-step-procedure-to-setup-waf\/?utm_source=blog-website&amp;utm-medium=text-link&amp;utm_campaign=aws-web-application-firewall-an-overview-and-step-by-step-procedure-to-setup-waf\" target=\"_blank\" rel=\"noopener\"><strong>AWS Web Application Firewall: An Overview here<\/strong><\/a>.<\/p>\n<h3 id=\"conclusion\">8. Conclusion<\/h3>\n<p>These are the few AWS services that provide your application and infrastructure security. Using these services, you can control the security aspects of your infrastructure and have control over your users by giving them appropriate IAM permission.<\/p>\n<p>Deploying AWS WAF and AWS Shield to your AWS environment is easy and will help you stay on top of your ever-increasing business security requirements.<\/p>\n<h3 id=\"aboutcloudthat\">9. About CloudThat<\/h3>\n<p><a href=\"https:\/\/www.cloudthat.com\/\"><strong>CloudThat\u00a0<\/strong><\/a>is also the official AWS (Amazon Web Services) Advanced Consulting Partner and Training partner and Microsoft gold partner, helping people develop knowledge of the cloud and help their businesses aim for higher goals using best in industry cloud computing practices and expertise. We are on a mission to build\u00a0a robust\u00a0cloud computing ecosystem by disseminating\u00a0knowledge on technological intricacies within the cloud space.\u00a0Our blogs, webinars,\u00a0case studies, and white papers\u00a0enable all the stakeholders in the cloud computing sphere.<\/p>\n<p>Drop a query if you have any questions regarding Security, IAM, or logging services on AWS, and I will get back to you quickly. To get started, go through\u00a0our<strong>\u00a0<\/strong><a href=\"https:\/\/www.cloudthat.com\/expert-advisory\/?utm_source=blog-website&amp;utm-medium=text-link&amp;utm_campaign=expert-advisory\"><strong>Expert Advisory<\/strong>\u00a0<\/a>page\u00a0and\u00a0<a href=\"https:\/\/www.cloudthat.com\/managed-services-packages\/\"><strong>Managed Services Package<\/strong><\/a>\u00a0that is<strong>\u00a0<a href=\"https:\/\/cloudthat.com\/?utm_source=blog-website&amp;utm-medium=text-link&amp;utm_campaign=cloudthat.com\/\">CloudThat<\/a><\/strong>\u2019s\u00a0offerings.<\/p>\n","protected":false},"author":254,"featured_media":12559,"parent":0,"comment_status":"open","ping_status":"open","template":"","blog_category":[3606,3607],"user_email":"shahida@cloudthat.com","published_by":"324","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/12428"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/254"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=12428"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/12428\/revisions"}],"predecessor-version":[{"id":45951,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/12428\/revisions\/45951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=12428"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=12428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}