{"id":4123,"date":"2019-03-01T17:32:30","date_gmt":"2019-03-01T10:32:30","guid":{"rendered":"http:\/\/54.151.235.32\/?p=4123"},"modified":"2021-03-03T18:00:27","modified_gmt":"2021-03-03T11:00:27","slug":"8-aws-security-best-practices-to-mitigate-risk","status":"publish","type":"post","link":"https:\/\/renovacloud.com\/en\/8-aws-security-best-practices-to-mitigate-risk\/","title":{"rendered":"8 AWS Security Best Practices to Mitigate Risk"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There are a lot of benefits that come with having Amazon Web Services (AWS) as your cloud platform, alone or as part of a hybrid or multi-cloud environment. The agility and flexibility of AWS\u2019s platform as a service (PaaS) and infrastructure as a service (IaaS) make it possible for your organization\u2019s network to be responsive, innovative, and ready for change. But there are security considerations. Outlined below are these considerations, along with <a href=\"https:\/\/renovacloud.com\/en\/market-guide-for-cloud-workload-protection-platforms\/\">security best practices<\/a> to help keep your AWS environment properly configured and secure.<\/span><\/p>\n<ol>\n<li><b> Visibility<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Cloud resources are ephemeral, which makes it difficult to keep track of assets. According to our research, the average lifespan of a cloud resource is two hours and seven minutes. And many companies have environments that involve multiple cloud accounts and regions. This leads to decentralized visibility, and since you can\u2019t secure what you can\u2019t see, this makes it difficult to detect risks.<\/span><\/p>\n<p><b>Best practice: <\/b><span style=\"font-weight: 400;\">Use a cloud security solution that provides visibility into the volume and types of resources (virtual machines, load balancers, security groups, users, etc.) across multiple cloud accounts and regions in a single pane of glass. Having visibility and an understanding of your environment enables you to implement more granular policies and reduce risk.<\/span><\/p>\n<ol start=\"2\">\n<li><b> Exposed root accounts<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Your root accounts can do the most harm when unauthorized parties acquire access to them. Administrators often forget to disable root API access.<\/span><\/p>\n<p><b>Best practice: <\/b><span style=\"font-weight: 400;\">Root accounts must be protected by multi-factor authentication and used sparingly. Not even your top admins should have access to your AWS root account the vast majority of the time, and never share them across users and applications.<\/span><\/p>\n<ol start=\"3\">\n<li><b><\/b> <b>IAM access keys<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">IAM access keys are often not rotated. This weakens IAM\u2019s ability to secure your user accounts and groups, giving cyber attackers a longer time window to acquire them.<\/span><\/p>\n<p><b>Best practice: <\/b><span style=\"font-weight: 400;\">Rotate or change your access keys at least once every 90 days. If you have given the users the necessary permissions, then they can rotate their own access keys. Plus, it ensures that old keys aren\u2019t being used to access critical services.<\/span><\/p>\n<ol start=\"4\">\n<li><b> Authentication practices<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">According to Verizon\u2019s annual Data Breach Investigations Report, lost or stolen credentials are a leading cause of cloud security incidents. It is not uncommon to find access credentials to public cloud environments exposed on the internet. Organizations need a way to detect account compromises.<\/span><\/p>\n<p><b>Best practice: <\/b><span style=\"font-weight: 400;\">Strong password policies and multi-factor authentication (MFA) should be enforced in AWS environments. Amazon recommends enabling MFA for all accounts that have console passwords. First, determine which accounts already have MFA. Then, go into IAM and select \u201cMFA device\u201d for each user. Smartphones and other devices can be used for an extra factor of authentication.<\/span><\/p>\n<ol start=\"5\">\n<li><b> Access privileges<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">AWS IAM can be deployed to manage all of your user accounts and groups, with policies and detailed permission options. Unfortunately, admins often assign overly permissive access to AWS resources. Not only does that enable users to make changes and have access they shouldn\u2019t be allowed to have, but if a cyber attacker acquires their account, more harm can be done.<\/span><\/p>\n<p><b>Best practice: <\/b><span style=\"font-weight: 400;\">Your configuration of IAM, like any user permission system, should comply with the principle of \u201cleast privilege.\u201d That means any user or group should only have the permissions required to perform their job, and no more.<\/span><\/p>\n<ol start=\"6\">\n<li><b> Broad IP ranges for security groups and unrestricted outbound traffic<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Security groups are like a firewall that controls traffic to the AWS environment. Unfortunately, admins often assign security groups IP ranges that are broader than necessary. Research from Unit 42\u2019s cloud research team found that 85% of resources associated with security groups don\u2019t restrict outbound traffic at all.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adding to the concern, increasing numbers of organizations were not following network security best practices and had misconfigurations or risky configurations. Industry best practices call for restricting outbound access to prevent accidental data loss or data exfiltration in the event of a breach.<\/span><\/p>\n<p><b>Best practice: <\/b><span style=\"font-weight: 400;\">Limit the IP ranges you assign to each security group in such a way that everything networks properly, but you aren\u2019t leaving a lot more open than you\u2019ll need.<\/span><\/p>\n<ol start=\"7\">\n<li><b> Audit history<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Organizations need oversight into user activities to reveal account compromises, insider threats, and other risks. The virtualization that\u2019s the backbone of cloud networks and the ability to use the infrastructure of a very large and experienced third-party vendor afford agility as privileged users can make changes to the environment as needed. The downside is the potential for insufficient security oversight. To avoid this risk, user activities must be tracked to identify account compromises and insider threats as well as assure that a malicious outsider hasn\u2019t hijacked those accounts. Fortunately, businesses can effectively monitor users when the right technologies are deployed.<\/span><\/p>\n<p><b>Best Practice:<\/b><span style=\"font-weight: 400;\"> AWS CloudTrail is a web service that provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. It must be used. Enabling CloudTrail simplifies security analysis, resource change tracking, and troubleshooting.<\/span><\/p>\n<ol start=\"8\">\n<li><b> Unpatched hosts<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">It is your responsibility to ensure the latest security patches have been applied to hosts within your AWS environment. Unit 42 provides insight into a related problem. Traditional network vulnerability scanners are most effective for on-premises networks but miss crucial vulnerabilities when they\u2019re used to test cloud networks.<\/span><\/p>\n<p><b>Best practice: <\/b><span style=\"font-weight: 400;\">Make sure hosts are frequently patched and apply any necessary hotfixes that are released by your OEM vendors. To do so, you need third-party tools that can map the data from your host vulnerability feeds, such as Amazon Inspector, to gain cloud-specific context.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a lot of benefits that come with having Amazon Web Services (AWS) as your cloud platform, alone or as part of a hybrid or multi-cloud environment. The agility and flexibility of AWS\u2019s platform as a service (PaaS) and infrastructure as a service (IaaS) make it possible for your organization\u2019s network to be responsive, [&#8230;]\n","protected":false},"author":7,"featured_media":4120,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-4123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-and-analytics"],"_links":{"self":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/posts\/4123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/comments?post=4123"}],"version-history":[{"count":0,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/posts\/4123\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/media\/4120"}],"wp:attachment":[{"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/media?parent=4123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/categories?post=4123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/renovacloud.com\/en\/wp-json\/wp\/v2\/tags?post=4123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}