DeepDefence security

There are a plethora of services AWS provides for security. They can be categorized into IAM, protect, detect, respond and audit categories. Below is a summary of these services and their purpose.

Category Service Purpose
IAM IAM Manage AWS users, policies and roles.
IAM IAM Identity Center 1. Manage users and permissions across multiple AWS accounts within organization.
2. Easily integrates with external ID providers.
3. Simplifies user management
Detect AWS Config 1. Continuous recording of resource configuration changes. View the time-line of changes
2. Configure compliance rule checks.
3. Configure pre-defined remediations
Detect GuardDuty Threat detection and anomaly detection
Detect Inspector 1. Finds software vulnerabilities in EC2, ECR and lambda.
2. Finds network exposures (open ports).
Detect CloudTrail Actions taken by a user, role, or an AWS service are recorded.
Detect Macie Classification of sensitive data (such as credit card info) in S3.
Detect Detective Collects log data, visualizes and helps in faster security investigations
Detect CloudWatch Log data ingestion
Detect SecurityHub Comprehensive view of security state. Remediation.
Detect CodeGuru CodeSecurity
Protect Firewall Manager Centrally configure and manage firewall rules across multiple accounts and applications.
Protect VPC security groups and ACLs Virtual firewall type functionality
Protect Network Firewall Network level intrusion detection/prevention service
Protect AWS Shield DDOS protection service
Protect Web app firewall SQL injections, XSS etc web app protection
Protect Key management service (KMS) For data encryption
Protect HSM Hardware based security module
(Except for regulatory compliance, this service has limited use)
Protect Secrets Manager Centrally manage secrets, password, API keys etc.
Audit Audit Manager Continuous audit of AWS usage. Automates evidence collection needed during audit.
Audit Artifact AWS security and compliance documents for download.
     

 

Following table lists common cybersecurity threats and the AWS services one can use to protect.

Threat AWS Service

Web application threats such as
XSS,
SQL Injections ,
Bad bots

Web application Firewall
Malware detection
Bit-coin mining
DOS
Intrusion
Network Firewall
Port scanning detection
(early stage attack or discovery)
Network Firewall
Web servers (Apache, IIS, Tomcat etc) vulnerabilities Network Firewall
Unusual API activity / unusual patterns GuardDuty
Malware Scanning GuardDuty
DDOS Attacks AWS Shield
Recursive DNS Queries Rouet 53 DNs Firewall
Source code Vulnerabilities CodeGuru