Must Know AWS Cloud Security Best Practices

Nutanix
3 min readOct 18, 2017

--

The importance of security cannot be stressed enough. Security is the forefront of your AWS Cloud. Your cloud deserves to have the best armour and the strongest security practices in place. You should always keep a tab on the AWS security page to be on top of security challenges and solutions.

Ensuring basic security best practices isn’t enough. You may have easily missed vital security best practices in your cloud, where large volume of resources are modified and launched on a daily basis. You can be always be on top of cloud security by making sure to continuously implement new security measures and tweaking your existing security plan.

Given below are a few must know security hacks that you must follow.

  1. Security Groups
    A security group acts as a virtual firewall that controls the inbound and outbound traffic for one or more instances. Stop data breach at the doorstep by reducing the number of open security ports. Only keep ports open that are associated with absolutely relevant IP and security groups.
  2. IAM MFA Audit
    Protect your cloud from online hackers. Just enable Multi Factor Authentication for IAM users.
  3. ELB Access Log
    ELB Access log is your answer to enhanced security!
  4. Termination Protection
    Accidental termination of mission critical EC2 instances can be a huge problem. Enable the API termination protection to allow anything like this to ever happen.
  5. ELB Listener Security Audit
    Don’t forget to create HTTPS or SSL listeners for publicly interfaced ELBs.
    Having no listener that use a secure protocol in your load balance can be a threat to your data.
  6. Unused IAM Access Keys
    It’s one of the easiest best practices you can do. If you have unused certain IAM access keys in the last 30 days or since creation, it’s time to remove them. It will not only give you better security but also avoid key compromises.
  7. Root Account Access Key
    One of the best ways to protect your account is to not have an access key for your root account. You can do this by creating one or more AWS Identity and Access Management (IAM) users and giving them the necessary permissions.
  8. IAM Admin Roles Audit
    Throw the risk of having only one unique IAM admin for your AWS account out of the window. Instead, have more AWS IAM users, give them the permissions, and use these IAMs for everyday interaction with AWS. Here’s an additional tip: Try to use temporary security credentials (IAM Roles) instead of long-term access keys.
  9. CloudTrail
    No Cloudtrail= Security risks!
    AWS CloudTrail is a web service that records API calls made on your account and delivers log files to your Amazon S3 bucket. If you want to track changes to resources, answer simple questions about user activity, demonstrate compliance, troubleshoot, or perform security analysis you should enable CloudTrail.
  10. IAM Admin Count
    It is dangerous to only have one admin account. But it can also be extremely bad for your security to have too many! Make sure to not have many IAM users with admin rights.

Here are more tip to help you in your security quest. Use a cloud management platform like Botmetric. It will implement the security best practices for you and perform a comprehensive audit of your AWS cloud infrastructure. Your job will become easier and your cloud security will become unbreakable.

These best practices are very crucial for your cloud security, but they are also only the tip of the iceberg. Ascertain the depths of cloud security best practices by reading the full article.

--

--

Nutanix
Nutanix

Written by Nutanix

We make infrastructure invisible, elevating IT to focus on the applications and services that power their business.

No responses yet