AWS Cloud: Proactive Security and Forensic Readiness – Part 4
Security controls can be either technical or administrative.
A layered security approach to protecting an organization’s information assets
and infrastructure should include preventative controls, detective controls and
corrective controls.
Preventative controls exist to prevent the threat from
coming in contact with the weakness. Detective controls exist to identify that
the threat has landed in our systems. Corrective controls exist to mitigate or
lessen the effects of the threat being manifested.
This post relates to detective controls within AWS Cloud.
It’s the fourth in a five-part series that provides a checklist for proactive
security and forensic readiness in the AWS Cloud environment.
Detective controls in AWS Cloud
AWS detective controls include processing of logs and
monitoring of events that allow for auditing, automated analysis, and alarming.
These controls can be implemented using AWS CloudTrail logs
to record AWS API calls, Service-specific logs (for Amazon S3, Amazon CloudFront,
CloudWatch logs, VPC flow logs, ELB logs, etc) and AWS Config to maintain a
detailed inventory of AWS resources and configuration. Amazon CloudWatch is a
monitoring service for AWS resources and can be used to trigger CloudWatch
events to automate security responses. Another useful tool is Amazon GuardDuty
which is a managed threat detection service in AWS and continuously monitors
for malicious or unauthorized.
Event logging
Security event logging is crucial for detecting security
threats or incidents. Security teams should produce, keep and regularly review
event logs that record user activities, exceptions, faults and information
security events. They should collect logs centrally and automatically analysed
to detect suspicious behavior. Automated alerts can monitor key metrics and
events related to security. It is critical to analyse logs in a timely manner
to identify and respond to potential security incidents. In addition, logs are
indispensable for forensic investigations.
The challenge of managing logs
However, managing logs can be a challenge. AWS makes log
management easier to implement by providing the ability to define a
data-retention lifecycle or define where data will be preserved, archived, or
eventually deleted. This makes predictable and reliable data handling simpler
and more cost-effective.
The following list recommends use of AWS Trusted Advisor for
detecting security threats within the AWS environment. It covers collection,
aggregation, analysis, monitoring and retention of logs, and, monitoring
security events and billing to detect unusual
activity.[Source]-https://blog.cloudsecurityalliance.org/2018/11/16/aws-cloud-proactive-security-forensic-readiness-2/
AWS Certification Course Courses in Mumbai. 30 hours practical training program on all
avenues of Amazon Web Services. Learn under AWS Expert.
Comments
Post a Comment