Whitepaper Security Best Practices 2010
Whitepaper Security Best Practices 2010
January 2011
This paper is excerpt from Architecting for the Cloud: Best Practices Whitepaper
(http://media.amazonwebservices.com/AWS_Cloud_Best_Practices.pdf)
January 2011
1 2
http://www.verisign.com/ssl/ http://www.entrust.net/ssl-products.htm 3 http://www.gnupg.org 4 http://www.pgp.com/ 5 http://www.truecrypt.org/ 6 http://www.arg0.net/encfs 7 http://loop-aes.sourceforge.net/loop-AES.README 8 http://www.saout.de/misc/dm-crypt/ 9 http://www.truecrypt.org/ 10 http://www.opensolaris.org/os/community/zfs/
January 2011
No matter which operating system or technology you choose, encrypting data at rest presents a challenge: managing the keys used to encrypt the data. If you lose the keys, you will lose your data forever and if your keys become compromised, the data may be at risk. Therefore, be sure to study the key management capabilities of any products you choose and establish a procedure that minimizes the risk of losing keys. Besides protecting your data from eavesdropping, also consider how to protect it from disaster. Take periodic snapshots of Amazon EBS volumes to ensure it is highly durable and available. Snapshots are incremental in nature and stored on Amazon S3 (separate geo-location) and can be restored back with a few clicks or command line calls.
11 12
http://aws.amazon.com/about-aws/whats-new/2009/08/31/seamlessly-rotate-your-access-credentials/ More info about Multi-factor Authentication is available at http://aws.amazon.com/mfa/ 13 AWS Management Console http://aws.amazon.com/console/ 14 More Info at http://aws.amazon.com.com/iam
January 2011
IAM is natively integrated into most AWS Services. No service APIs have changed to support IAM, and applications and tools built on top of the AWS service APIs will continue to work when using IAM. Applications only need to begin using the access keys generated for a new User. You should minimize the use of your AWS Account credentials as much as possible when interacting with your AWS Services and take advantage of IAM User credentials to access AWS Services and resources.
Figure 1: Securing your Web Application using Amazon EC2 Security Groups
Another way to restrict incoming traffic is to configure software-based firewalls on your instances. Windows instances can use the built-in firewall16. Linux instances can use netfilter17 and iptables.
15
More info about Security Group is available at http://docs.amazonwebservices.com/AWSEC2/2009-0715/UserGuide/index.html?using-network-security.html 16 http://technet.microsoft.com/en-us/library/cc779199(WS.10).aspx, March 2003 17 http://www.netfilter.org/
January 2011
Over time, errors in software are discovered and require patches to fix. You should ensure the following basic guidelines to maximize security of your application: Regularly download patches from the vendor's web site and update your AMIs Redeploy instances from the new AMIs and test your applications to ensure the patches don't break anything. Ensure that the latest AMI is deployed across all instances Invest in test scripts so that you can run security checks periodically and automate the process Ensure that the third-party software is configured to the most secure settings Never run your processes as root or Administrator login unless absolutely necessary
All the standard security practices pre-cloud era like adopting good coding practices, isolating sensitive data are still applicable and should be implemented. In retrospect, the cloud abstracts the complexity of the physical security from you and gives you the control through tools and features so that you can secure your application. This paper is excerpt from Architecting for the Cloud: Best Practices Whitepaper. [3]