AWS CP 2022 Day2
AWS CP 2022 Day2
Michael J Shannon
Class will begin at
11:00 A.M. Eastern
Standard Time (EST)
Choosing the Right Region
• Basic
• Developer
• Business
• Enterprise
• Only these plans can use AWS Shield Advanced due to 24/7 support teams
• AWS Infrastructure Event Management (IEM) offers architecture and scaling
guidance along with operational support for an additional fee
• AWS Support API provides programmatic access to some of the features of the
AWS Service Catalog for support case management operations and Trusted
Advisor operations (to access the checks)
• Enterprise plans only get the Concierge Support Team
• Get access to all 115 Trusted Advisor checks (14 cost optimization, 17 security,
24 fault tolerance, 10 performance, and 50 service limits) and associated
recommendations
• Online tool that offers real time guidance on provisioning
resources using AWS best practices
• “Checks” help to optimize an AWS infrastructure, increase
security, enhance performance, reduce total costs, and
monitor service limits
• AWS Basic and Developer Support plan customers get 7
security checks and 50 service limit (quota) checks:
• S3 Bucket Permissions
• Security Groups - Specific Ports Unrestricted
• IAM Use
• MFA on Root Account
• EBS and RDS Public Snapshots
• Identity and Access Management is a core
AWS security service that enables the
secure control of access to AWS resources
• IAM manages who is signed in
(authenticated) and has permissions
(authorized) to use resources
• The AWS account root user is separate from IAM
• The Root user is a single standalone sign-in identity
• The root user has total access to all AWS services and
resources in the account
• Do not use the root user account for common tasks
• Use the root user only to create your first IAM highest
privilege administrative user
• Password policies apply to all IAM users but
not to the root account user
• Must have a minimum of 8 characters and a
maximum of 128 characters
• Cannot be identical to your AWS account
name or e-mail address
• AWS Management Console
• AWS command line tools
• AWS software development kits – SDKs
• IAM HTTPS API
• A standalone permission set that is created
and administered by AWS
• Standalone policies have their own Amazon
Resource Name (ARN) that includes the
policy name.
• For example:
arn:aws:iam::aws:policy/IAMReadOnlyAccess
• They are intended to offer permissions for
many common AWS use cases
• Full-access
• Power-user
• Partial-access
• Identity that has permission assigned
• Intended to be assumed by a user, application, or
service
• Does not have long-term credentials like
passwords or keys
• AWS offers temporary credentials for the lifetime
of session
• Often used to give access to identities outside of
AWS
• A web service for creating temporary credentials
• In your own code
• Command-line-interface
• Third-party tools
• Assumes necessary IAM roles with the trusted relationship
• Generates temporary, time-limited permission-based credentials only for a validity
period
• Two ways to generate temporary credentials
• Generate them with the CLI
• Create from your code
• Applications running outside of AWS will
need access keys
• AWS SDKs will have digital signatures
performed
• Signing protects message integrity by
preventing tampering
• Requests must reach AWS within 15
minutes of the time stamp
• Version 4 also offers Forward Secrecy
Network ACLs (NACLs)
• Allow stateless traffic filtering to all inbound or
outbound traffic on a VPC subnet
• Apply to all instances in the associated subnet
• Can contain ordered rules to permit or deny traffic
(Rules are processed with a numbered order)
• Are agnostic of TCP sessions or UDP/ICMP flows
• Are stateless (static) in that the return traffic must be
explicitly allowed in the other NACL
• Work together with security groups and can permit
or deny traffic before it reaches the interfaces
• Apply to individual EC2 instances in a subnet
• Layer 3/4 stateful virtual “Allow Only”
firewalls – no explicit deny rules
• Operate at the hypervisor level attached to
the virtual elastic network interfaces (eth0)
• ALL EC2 instances are launched with the
default SG unless otherwise designated
• An unchanged Default SG will allow
communication between all resources
within the security group AND all outbound
traffic - all other traffic is implicitly denied
• Return traffic is automatically allowed (with
Shield Standard inspection)
• All rules in all applied security groups are
evaluated before a decision is made
• You can only create a limited number of
security groups on every VPC that you have
• There is also a limit on the number of rules
you can add to one security group
• There is a limited number of security groups
that you can use with a network interface
Control and monitor HTTP/HTTPS
requests forwarded to CloudFront (CDN),
Application Elastic Load Balancer (ELB) or
an API Gateway
• Allow all requests except for ones you
designate (permissive)
• Block all requests except for ones you
designate (restrictive)
• Count the requests that match the
properties that you specify
Matching Condition Sets
• EC2
• Lightsail
• Elastic Beanstalk
• Lambda
• Elastic Container Service (ECS)
Deploying EC2 Instances
Desired Capacity
Maximum Size
Elastic Load Balancing (ELB)
Instance A Snapshot
Bucket
Instance B
Instance Store