Improve your AWS safety posture, Step 3: Encrypt AWS information in transit and at relaxation

0
186
Improve your AWS safety posture, Step 3: Encrypt AWS information in transit and at relaxation


In the primary two blogs on this sequence, we mentioned correctly establishing IAM and avoiding direct web entry to AWS sources. In this weblog, we’ll sort out encrypting AWS in transit and at relaxation.

Sometimes, regardless of all efforts on the contrary, information will be compromised.  This can happen because of information leakage via defective apps or methods, by laptops or moveable storage gadgets being misplaced, by malicious actors breaking via safety defenses, by social engineering assaults, or by information being intercepted in man-in-the-middle assaults.  Fortunately, with ample encryption measures in place, information exposures resembling these will be nullified.  Simply put, when information is correctly encrypted with trade authorised algorithms, it will possibly’t be deciphered.  The solely approach to make sense of encrypted information is by decrypting it with an encryption key that solely trusted events possess.  Let’s focus on how AWS makes it simple to encrypt information wherever it could be.

Encrypting information in transit

When you go to a web site and see the small lock icon within the browser toolbar, it signifies that information being despatched between your laptop and the web site host is safe.  If your information was intercepted by a malicious actor, they might not have the ability to decipher it since it’s encrypted. 

Through an encryption course of that’s past the scope of this weblog sequence, computer systems and web site hosts negotiate the encryption algorithm and keys which might be used throughout periods.  Thus, since solely the speaking computer systems and web site hosts know the encryption keys in use, information is protected against prying eyes.  (Note: an exception to this assertion is that if the technology of encryption keys happens over a publicly obtainable Internet connection (e.g., espresso store WiFi).  Cybercriminals might intercept this change of knowledge and eavesdrop in your communication. That is why it is strongly recommended to provoke a digital personal community (VPN) connection to a trusted supplier earlier than visiting web sites when utilizing a public Internet connection). 

AWS gives a handy service to encrypt information in transit known as Amazon Certificate Manager (ACM).  Per AWS, ACM “handles the complexity of creating, storing, and renewing public and private SSL/TLS X.509 certificates and keys that protect your AWS websites and applications.”  What Is AWS Certificate Manager? – AWS Certificate Manager (amazon.com).  These X.509 certificates can be utilized with AWS ELBs, CloudEntrance, and Amazon API Gateway.  Consequently, all Internet certain visitors to and from these sources might be safe.

Furthermore, AWS can encrypt information in transit utilizing X.509 certificates to AWS managed sources like S3 buckets.  However, to allow this function insurance policies might should be up to date to limit HTTP and solely allow HTTPS connectivity.  To see an instance of how AWS S3 can implement HTTPS connections, click on right here: Enforce TLS 1.2 or increased for Amazon S3 buckets

Now that we all know tips on how to encrypt information in transit, let’s transfer on to our closing subject of dialogue – encrypting information at relaxation. 

Encrypting information at relaxation

One of the best and most impactful safety measures AWS has to supply is encrypting information at relaxation.  Literally, with a couple of clicks of the mouse, each main AWS service that shops information will be encrypted with default encryption keys which might be owned and maintained by AWS.  The service used to carry out these actions is named AWS Key Management Service (AWS KMS). 

Thus, if for some cause your information was uncovered to the world, it might be illegible with out the encryption key that solely AWS can entry in your behalf.  A fast Google search on the Internet will reveal that the period of time used to crack a typical AES-256 encryption key would take fashionable computer systems trillions of years – even with the world’s quickest supercomputers. 

If legal guidelines, rules, or company coverage require you to handle your personal encryption keys, AWS has different choices.  Through KMS, AWS clients can import their very own key materials for AWS to make use of for encryption on their behalf.  If clients are not looking for AWS to have any entry to their encryption keys, AWS additionally affords {hardware} safety modules (HSMs).  These will be provisioned and used like a utility with an hourly value. 

AWS HSMs are licensed as FIPS 140-2 compliant.  For these unfamiliar with this designation, it refers to rigorous testing to fulfill authorities authorised safety requirements.  To be taught extra about AWS KMS click on right here: Key Usage — AWS Key Management Service — Amazon Web Services.  To be taught extra about AWS HSM, click on right here: Security HSM | AWS CloudHSM | Amazon Web Services

As such, contemplating the multitude of choices and ease of use to encrypt information at relaxation, there merely isn’t an excuse to not encrypt information wherever it’s saved. 

Tying every part collectively

In this text, we’ve mentioned three simple steps each enterprise or governmental entity can pursue to dramatically enhance their AWS safety posture.  As a recap, these steps are to 1) arrange and use IAM correctly, 2) keep away from direct Internet entry to susceptible AWS sources, and three) encrypt information in transit or at relaxation.  It goes with out saying that these steps will not be exhaustive.  They are merely the steps that this creator believes to be probably the most impactful. 

Many different safety mechanisms exist that AWS clients can pursue.  For extra superior AWS safety assist, you’re inspired to have interaction AT&T’s cybersecurity consulting division for assist.  We are prepared, prepared, and ready that can assist you along with your AWS cybersecurity wants.  To get extra details about AT&T cybersecurity consulting, please click on right here: Cybersecurity Consulting Services | AT&T Business (att.com)

Thank you for taking the time to learn this weblog sequence.  I sincerely hope you discovered it informative and helpful. 

References:

AWS – https://aws.amazon.com

A Cloud Guru – https://acloudguru.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here