0% found this document useful (0 votes)
51 views16 pages

Cloud Business Transformation Security Best Practices

cloud best practice

Uploaded by

Ibrahim Sumaila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views16 pages

Cloud Business Transformation Security Best Practices

cloud best practice

Uploaded by

Ibrahim Sumaila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

A W S SECU RIT Y

Cloud business
transformation
security best
practices
Table of contents

Introduction................................................................................................................................................................................. 3

Cloud security in AWS.................................................................................................................................................................... 4

Cloud security—a shared responsibility............................................................................................................................................. 6

AWS Cloud Adoption Framework—a security perspective.................................................................................................................... 11

Creating your AWS migration strategy............................................................................................................................................. 15

Learn more.................................................................................................................................................................................. 16

Notices

This document is provided for informational purposes only. It represents the current product offerings and practices from Amazon Web Services (AWS) as of the date of issue of this document, which are subject to change without notice. Customers
are responsible for making their own independent assessment of the information in this document and any use of AWS products or services, each of which is provided “as is” without warranty of any kind, whether express or implied. This document
does not create any warranties, representations, contractual commitments, conditions, or assurances from AWS, its affiliates, suppliers, or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and
this document is not part of, nor does it modify, any agreement between AWS and its customers.

2
Introduction
Moving to the cloud means making transformational changes to your “AWS is well known for data security and
business processes, services, cost structure, and scale. It also requires disaster recovery, making it easier for us
you to modernize your approach to security. Take the opportunity
to convince insurers that data is securely
to make the move from self-managed, on-premises security and
assurance techniques to a fully managed service architecture that will
stored outside of their data centers.”1
support and scale with your new business transformation architecture.
Roland Chang, Business Development Strategist,
Wesurance
Organizations must meet and achieve thousands of third-party global
validation compliance requirements. AWS helps support organizations
to meet these requirements by sharing the responsibility of security
and compliance while helping them scale in the cloud and automate
security tasks. Evolving toward automated security also helps reduce “We chose AWS because it helps us to meet
human configuration errors and gives teams time to focus on other
data protection standards and provides
work critical to your business.
the scalability we need.”2

Benjamin Sauer, Head of Backend Engineering,


Climedo Health
How this eBook will benefit you

This eBook will appeal to security executives such as chief


information security officers (CISOs) and security IT leaders.
Discover how AWS protects the infrastructure that runs all
of the services offered in the AWS Cloud. Better understand
your role and responsibilities for security in the cloud and
the security services you use.

1 “Wesurance Drives Transformation for Insurers with Innovative Digital Solutions on AWS,” AWS case study, 2021
2 “Climedo Health Captures Patient-Centric, Compliant, and Secure Clinical Data Using AWS,” AWS case study, 2022

3
Cloud security
in AWS
AWS is architected to be the most flexible
and secure cloud computing environment
available today, giving you the ability to
control your environment so that it meets or
exceeds the control capabilities of your legacy
infrastructure. AWS offers tools and support
for compliance, assurance, and monitoring
of infrastructure and application changes.
It also saves you time by helping you create
guardrails to allow innovation and to ensure
a security baseline without requiring manual
security reviews. All of this helps your security
and IT teams focus more on your core business
and less on security by automating incident
response for anomalies or deviations from
your security baseline.

4
3 benefits of AWS cloud security

1 Build, run, and scale your applications on infrastructure architected to be the most
THE HIGHEST STANDARDS
secure cloud computing environment available today. Benefit from a cloud and network
architecture built to meet the requirements of the most security-sensitive organizations,
including governments, financial services, and healthcare.
The AWS team is
monitoring systems
2 Move fast and stay secure by confidently integrating and automating security into every continuously, 24/7, to
part of your organization. AWS provides organization-wide controls that automate
infrastructure and application security checks to continually enforce security and
help ensure your content
compliance controls. Customers can then implement automated reasoning tools to is constantly protected.
mathematically prove the highest levels of security.

3 Innovate with a wide portfolio of security services and partner solutions to help achieve
end-to-end security for your organization. AWS security services and solutions help
customers implement every step of their organization’s optimal security posture, from
identifying risks to remediation. Customers can extend the benefits of AWS by using
security technology and consulting services from AWS Professional Services and the
AWS Partner Network.

5
Cloud security— When you move your IT infrastructure to AWS, you adopt the model of shared responsibility.
This shared model provides multiple benefits, including reducing your operational burden as

a shared AWS operates, manages, and controls the layers of IT components—from the host operating
system and virtualization layer to the physical security of the facilities in which the services

responsibility operate. Just as you share the responsibility for operating the IT environment with us, you
also share the management, operation, and verification of IT controls.

Customer Data

Customer PLATFORM, APPLICATIONS, AND IDENTITY AND ACCESS MANAGEMENT

Responsibility for OPERATING SYSTEM, NETWORK, AND FIREWALL CONFIGURATION


Security “IN” the Cloud
Client-Side Data, Server-Side Encryption Networking Traffic
Encryption, and Data (File System and/or Protection (Encryption,
Integrity Authentication Data) Integrity, Identity)

Software
COMPUTE STORAGE DATABASE NETWORKING
AWS
Responsibility for Hardware/AWS Global Infrastructure
Security “OF” the Cloud

REGIONS AVAILABILITY ZONES EDGE LOCATIONS

6
AWS—security of the cloud Third-party independent assessments validate the effectiveness and
efficient operations of the ubiquitous AWS IT control environment and
facilities across the globe. These include policies, processes, and control
AWS is responsible for protecting the infrastructure that runs all the activities that use various aspects of the overall AWS control environment.
services offered in AWS. AWS infrastructure is composed of hardware,
software, networking, and facilities that run AWS services. From the host
operating system to the physical security of the facilities, it reduces the Privacy
operational burden for organizations. Gain peace of mind knowing your
Privacy is largely about having control of who can access data. With AWS,
information, identities, applications, and devices are protected.
you know who is accessing your content and what resources your organization
is consuming at any given moment. Provide the right level of access to your
resources at all times. Use fine-grain identity and access controls and
AWS security assurance
continuous monitoring for near real-time security information—regardless
As the leading cloud provider, AWS has comprehensive compliance controls of where your information is stored.
with established, widely recognized frameworks and programs. These
Reduce risk and enable growth by using our activity monitoring services
controls help satisfy compliance requirements for regulatory agencies
that detect configuration changes and security events across your system.
around the world, which you’ll inherit automatically. Not only do they
Integrate our services with your existing solutions to help simplify your
dramatically lower the costs of your security assurance efforts, but they
operations and compliance reporting. AWS gives you control that can help
also strengthen your own compliance and certification programs.
you comply with the regional and local data privacy laws and regulations
applicable to your organization.

COMPLIANCE CONTROL S
AWS supports 143 security and compliance certifications, including:

SOC DoD CC SRG C5 HITRUST CSF

PCI HIPAA BAA K-ISMS FINMA

ISMAP IRAP ENS High GSMA

FedRAMP MTCS OSPAR PiTuKri

7
Data residency
AWS data centers are built in clusters in various locations around the
world and are known as AWS Regions. You choose the AWS Regions
in which your customer content is stored. Deploy AWS services in the
locations of your choice in accordance with your specific geographic
requirements and to help you meet your compliance and data residency “With AWS, all sensitive data is segmented,
requirements. For example, if you are an AWS customer in Australia
controlled, and encrypted. Even if we were
who wants to store your data only in Australia, you can choose to
deploy AWS services exclusively in the Asia Pacific (Sydney) AWS
compromised on some level, our architecture
Region. Discover other flexible storage options around the world. is set so that everything is anonymized,
tokenized, and encrypted to prevent
data leaks.”3
Business continuity
Bryan Carroll, Chief Executive Officer and Cofounder, TNEX
AWS infrastructure has a high level of availability and delivers the
features you need to deploy a resilient IT architecture. Our systems
are designed to tolerate system or hardware failures with minimal
customer impact.

Disaster recovery
Remain resilient in the face of most failure modes, including natural
disasters or system failures by distributing applications across multiple
AWS Availability Zones. AWS Elastic Disaster Recovery minimizes
downtime and data loss with fast, reliable recovery of on-premises and
cloud-based applications using affordable storage, minimal compute,
and point-in-time recovery.

3 “TNEX Launches Vietnam’s First Digital Bank in Nine Months on AWS,” AWS case study, 2021

8
Customers—security in How to securely manage your AWS resources

the cloud Your responsibilities will vary depending on the services you use, the
integration of those services with your IT environment, and applicable
laws and regulations. You should take all of this into consideration when
While AWS does the heavy lifting for security of the cloud, customers you choose AWS services. AWS offers different levels of support to help
are responsible for security in the cloud, including managing the guest you raise the security posture of your environment to meet the security
operating system and associated application software. and compliance requirements of your company. Tools and services available
include documented best practices, professional services, and solutions
that automate security and compliance posture checks.

9
Benefits of AWS security and identity services
To help establish security in the cloud, AWS offers a broad selection of innovative
security services to meet your own security and regulatory requirements.

Data protection Detection and


Identity services Network protection Compliance
and privacy response

Identity management, AWS provides technical, Network and application AWS detection and Compliance and data
access controls, and operational, and protection services on response services work privacy with AWS gives
governance are contractual measures AWS enable you to enforce together to help you enhance you a comprehensive view
foundational security needed to protect your fine-grained security your security posture and of your compliance status
pillars for organizations data. With AWS, you policies at every network streamline security and continuously monitors
of any size and type. With manage the privacy control point across your operations across your your environment using
AWS, your security and IT controls of your data, organization. AWS network entire AWS environment automated compliance
teams can adopt modern control how your data and application protection by continuously identifying checks based on the
cloud-centric identity is used, who has access to services then provide and prioritizing security AWS best practices and
solutions and Zero Trust it, and how it is encrypted. equally flexible solutions risks, while integrating industry standards your
architectures to securely We underpin these that inspect and filter traffic security practices earlier in organization follows.
support a hybrid workforce, capabilities with the most to prevent unauthorized the development lifecycle.
improve access experiences, flexible and secure cloud resource access.
manage permissions, and computing environment
help meet stringent available today.
compliance mandates.

10
AWS Cloud A successful and secure cloud adoption journey starts with using AWS
experience and best practices in the AWS Cloud Adoption Framework

Adoption (AWS CAF). From a security perspective, the framework provides best
practices for building enhanced security capabilities and resilient

Framework— workloads. The following nine capabilities can help you identify and
prioritize security readiness and achieve the confidentiality, integrity,

a security
and availability of your data and workloads. Common stakeholders
include CISOs, chief commercial officers (CCOs), internal audit leaders,

perspective
and security architects and engineers.

9 capabilities of the AWS


Cloud Adoption Framework

1 Security governance

2 Security assurance

3 Identity and access management

4 Threat detection and monitoring

5 Vulnerability management

6 Infrastructure protection

7 Data protection

8 Application security

9 Incident response

11
9 capabilities of the AWS Cloud Adoption Framework—a security perspective (continued)

1 Security governance 2 Security assurance 3 I dentity and access


An effective security program requires defining, To improve the effectiveness of your security
management
developing, maintaining, and communicating programs, continuous monitoring, evaluating, Ensuring the right people have access to the
certain items, including security roles, and managing are critical. Building trust
right resources under the right conditions is
responsibilities, accountabilities, policies, and confidence around the controls you’ve critical as you run more workloads and continue
processes, and procedures. A clear line of implemented will enable you to meet
to scale on AWS. Identity and access management
accountability ensures a more effective regulatory requirements effectively. plays a central role when it comes to operating
security program.
secure AWS workloads. Both human and
machine identities need to be authenticated
and authorized. Permissions management
allows for broad and granular access controls
with capabilities of least privilege.

12
9 capabilities of the AWS Cloud Adoption Framework—a security perspective (continued)

4  hreat detection
T 5 Vulnerability management 6 Infrastructure protection
and monitoring You can have a broad range and a dynamic Control methodologies are critical for successful
set of software and software versions across ongoing operations in the cloud and to meet
Threat detection is necessary to continuously
your server and container workloads. New best practices and regulatory obligations. A key
monitor your environment to identify normal
and legitimate behaviors of the assets and software vulnerabilities are regularly announced— part of an information security program is
vulnerability management is critical to automate infrastructure protection to ensure systems
resources in use. Using techniques such as
machine learning, anomaly detection, automated identifying and prioritizing potential exposures and services within your workload are protected
quickly to enable remediation to occur. against unintended and unauthorized access
best practice checks, and intelligent vulnerability
management of potential misconfiguration, and potential vulnerabilities.

misbehavior, or unauthorized usage, can be


quickly determined and communicated to
reduce the time to remediate.

13
9 capabilities of the AWS Cloud Adoption Framework—a security perspective (continued)

7 Data protection 8 Application security 9 Incident response


Foundational practices that influence security Keep security top of mind to save on time, Preparation is key for your organization to
should always be in place before architecting effort, and costs when a security flaw is respond to and mitigate the potential impact
any workload. This is critical to supporting identified during the software development of security incidents. Minimizing business
objectives such as preventing mishandling process. Putting policies in place for security disruption and enabling your team to operate
or complying with regulatory obligations. All at the development stage of your application effectively during an incident—isolating,
data should be encrypted in rest and in transit, provides peace of mind that security gaps containing, and performing forensics on issues—
and sensitive data should be stored in separate are minimized. requires putting the right tools and access in
accounts to reduce risk and vulnerabilities. place ahead of a security incident.

14
Creating your AWS AWS Well-Architected Framework

migration strategy
When it comes to building secure, high-performing, resilient, and
efficient infrastructure for a variety of applications and workloads,
the AWS Well-Architected Framework is the go-to source to help
cloud architects focus on the workload level. The security pillar of
Whether you are creating and planning for a successful and
the framework is built around five components:
secure cloud adoption journey or reworking your existing
workloads on AWS, there are several industry-accepted
standards and frameworks to help you build a strong • Identity and access management
security foundation.
• Detection
When it comes to building your IT governance and security
management systems, the AWS Cloud Adoption Framework • Infrastructure protection
helps you plan for a successful and secure cloud migration.
• Data protection
The AWS Well-Architected Framework assists with building
secure infrastructure while automated checks for AWS • Incident response
security best practices allow you to continuously evaluate
AWS accounts from a security perspective.
The AWS Well-Architected Framework provides guidance for secure
implementation and approaches for selecting the right AWS services,
and it helps to implement these core security practices in your workloads.

Automated checks for AWS security best practices:


AWS Security Hub

It is essential to detect when your deployed accounts and resources


are deviating from security best practices to maintain your organization’s
security posture. AWS Foundational Security Best Practices standard
utilizes a set of controls to allow you to continuously evaluate all your
AWS accounts and workloads, providing actionable and prescriptive
guidance to continuously improve your cloud security.

15
Learn more

Get started securing your workloads in the cloud


Discover more about securing your move to the cloud with security, identity, and compliance on AWS.
Learn more ›

Access security content


Learn more about AWS offerings in security and customer-related content in the AWS Security Hub.
Find useful webinars, whitepapers, quick reference guides, and eBooks on various security topics.
Learn more ›

© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved.
16

You might also like