STCLOUD_mod4 cloud security FULL

20250707 STCLOUD Module 4 AWS Cloud Security FULL

RAW FILE

This note has not been edited yet.

Announcements

Module 4 AWS Cloud Security

(6:39)

Section 1: Shared Responsibility Model

ex. bike rental scenario:
_attachments/Pasted image 20250721195823.png

as a customer, we have certain permissions we can perform:

So user's responsibility includes:

(from the ppt)

Note

Customers are responsible for security IN the cloud
Providers are responsible for security OF the cloud

as a cloud provider, they have control over the following:

So the provider's responsibility includes:

ex.
if you set the permissions in GDrive to only be accessible to you but someone unauthorized was able to get a hold of it because of a vulnerability in GDrive, then the fault is on the provider.\

the more control you have the more responsibility that you have as well

AWS Responsibility: Security OF the cloud

(24:49)
_attachments/Pasted image 20250721202421.png

cloud providers are responsible for:

Customer Responsibility: Security IN the cloud

_attachments/Pasted image 20250721202441.png

Service Characteristics and Security Responsibility

(34:38)

_attachments/Pasted image 20250721215756.png
_attachments/Pasted image 20250721215804.png

Infrastructure as a Service (IaaS)

  1. Amazon EC2 (virtual machines)
  2. Amazon Block Store (block storage)
  3. Amazon VPC (networks)

Platform as a Service (PaaS)

  1. AWS Lambda (serverless compute → you have a server but you don't manage the server)
    1. ex. you have a web application that runs a python script on images of food. the image gets sent to a server you dont manage, output is the amount of calories based on the image
    2. cheapest option for compute, all you have to do is do API calls to the python code and you get the result
  2. Amazon RDS ("managed database" → the server is managed by the provider na you just need to choose what kind of DB, focus on your data)
  3. Amazon Elastic Beanstalk (orchestration → deploys the machine and servers that you like, you just need to set the configurations)

Gemini on orchestration: In the context of cloud computing and cloud services, orchestration refers to the automated arrangement, coordination, and management of complex services, workflows, and resources across various cloud environments. Cloud orchestration is about bringing order and automation to the complexity of modern cloud environments, allowing organizations to manage their cloud resources and services with greater efficiency, agility, and control.

Software as a Service (SaaS)

think of GDrive..
provider handles:

  1. AWS Trusted Advisor
  2. AWS Shield
  3. Amazon Chime

questions: (47:13-1:07:26)

Section 2: AWS Identity and Access Management (IAM)

involves the following entities/essential components:

Authorization: What actions are permitted

_attachments/Pasted image 20250721225748.png

IAM: Authorization (best practices)

IAM: Policy Example

_attachments/Pasted image 20250721230129.png

IAM: Permissions

_attachments/Pasted image 20250721230246.png

Section 3: Securing a new AWS Account, best practices when using the cloud

AWS account root user access versus IAM access

_attachments/Pasted image 20250721230659.png

Securing a new AWS account: Account root user, MFA, AWS CloudTrail, Billing Reports

step 1: stop using the account root user as soon as possible

to stop using the account root user

step 2: enable multi-factor authentication

options for retrieving the MFA token

step 3: use AWS CloudTrail (logs)

to access CloudTrail:

step 4: enable a billing report, such as the AWS Cost and Usage Report

Summary for best practices:

  1. user permissions: follow the principle of least privilege
  2. do not use the AWS account root user except when necessary
  3. enable multi-factor authentication
  4. use logs/AWS CloudTrail
  5. enable billing reports (logs but for the costs)

Section 4: Securing Accounts

(1:19:26)
_attachments/Pasted image 20250721232116.png

IAM → users
Organizations → Accounts

IAM policy → IAM users
SCPolicies → accounts (are not under IAM, you have to join them in an organization to use SCPs)

AWS Organizations: Service Control Policies

AWS Key Management Service (AWS KMS)

_attachments/Pasted image 20250721233214.png
AWS KMS features:

Amazon Cognito (centralized log in and sign-in options)

_attachments/Pasted image 20250721233354.png

AWS Shield

_attachments/Pasted image 20250721233550.png

another best practice: use features to protect yourself readily available on the cloud or you can configure them yourself for added security, and to minimize downtime and latency

Section 5: Securing Data

types of data

how do you secure your data? → encryption

Encryption of data at rest

Encryption of data in transit

_attachments/Pasted image 20250721234717.png

Section 6: Working to ensure Compliance

_attachments/Pasted image 20250721234844.png
AWS engages with certifying bodies and independent auditors to provide customers with detailed information about the policies, processes, and controls that are established and operated by AWS.