I agree to cookies for making this site function. By using this site, I agree to the Privacy Policy and Terms of Use.
Accept
HACKTORIAHACKTORIA
  • Home
  • Articles
    • CyberSecurity
    • OSINT
    • Networking
    • Programming
    • Software
    • Cloud
    • Crypto & Blockchain
    • Opinion
  • Monthly CTF
    • Challenges
      • The Mona Lisa Heist
      • Operation Mare Nostrum
      • Downtown Murderer
      • Operation Galaxios
      • Operation Brutus
      • Operation Runner
      • Operation Warthog
    • Storyline
      • April 2022 – Operation Galaxios
      • March 2022 – Operation Brutus
      • February 2022 – Operation Runner
      • January 2022 – Operation Warthog
    • Characters
    • Finishers 2022
    • Write-Ups
  • Practice
    • Fact Checking
      • Fact Checking 10
      • Fact Checking 9
      • Fact Checking 8
      • Fact Checking 7
      • Fact Checking 6
      • Fact Checking 5
      • Fact Checking 4
      • Fact Checking 3
      • Fact Checking 2
      • Fact Checking 1
    • Geolocation
      • Geolocation 32
      • Geolocation 31
      • Geolocation 30
      • Geolocation 29
      • Geolocation 28
      • Geolocation 27
      • Geolocation 26
      • Geolocation 25
      • Geolocation 24
      • Geolocation 23
      • Geolocation 22
      • Geolocation 21
      • Geolocation 20
      • Geolocation 19
      • Geolocation 18
      • Geolocation 17
      • Geolocation 16
      • Geolocation 15
      • Geolocation 14
      • Geolocation 13
      • Geolocation 12
      • Geolocation 11
      • Geolocation 10
      • Geolocation 9
      • Geolocation 8
      • Geolocation 7
      • Geolocation 6
      • Geolocation 5
      • Geolocation 4
      • Geolocation 3
      • Geolocation 2
      • Geolocation 1
    • Image Analysis
      • Image Analysis 16
      • Image Analysis 15
      • Image Analysis 14
      • Image Analysis 13
      • Image Analysis 12
      • Image Analysis 11
      • Image Analysis 10
      • Image Analysis 9
      • Image Analysis 8
      • Image Analysis 7
      • Image Analysis 6
      • Image Analysis 5
      • Image Analysis 4
      • Image Analysis 3
      • Image Analysis 2
      • Image Analysis 1
  • Videos
  • Art
  • About
    • Frank
    • Noureldin
    • Maria
    • Roxanna
    • Dipti
    • Joy
    • Oriana
    • Simone
    • Rudraksh
    • Amogh
    • Tony
Reading: AWS security best practices for non-security professionals
Share
Aa
HACKTORIAHACKTORIA
Aa
Search
  • Home
  • Articles
    • CyberSecurity
    • OSINT
    • Networking
    • Programming
    • Software
    • Cloud
    • Crypto & Blockchain
    • Opinion
  • Monthly CTF
    • Challenges
    • Storyline
    • Characters
    • Finishers 2022
    • Write-Ups
  • Practice
    • Fact Checking
    • Geolocation
    • Image Analysis
  • Videos
  • Art
  • About
    • Frank
    • Noureldin
    • Maria
    • Roxanna
    • Dipti
    • Joy
    • Oriana
    • Simone
    • Rudraksh
    • Amogh
    • Tony
Follow US
© 2022 HACKTORIA
AWS
HACKTORIA > Articles > Cloud > AWS security best practices for non-security professionals
Cloud

AWS security best practices for non-security professionals

Noureldin Ehab
Noureldin Ehab May 24, 2022
Updated 2022/06/14 at 5:15 PM
Share
SHARE
Contents
First, we need to understand what makes a system secure?ConfidentialityIntegrity:Availability:What is AWS Security?AWS Security Practices1. Implementing strong password policies2. Implementing 2 Factor Authentication3. Don’t hard code secrets4. Use managed IAM policies5. Follow the AWS News blog6. Activate all the AWS security controls and services 7. Always use Encryption8. Keep the Least Privilege Principle in mind9. Regular data backups10. Test security (Pentests)Extra ResourcesAWS Security Specialist CertificationSecurity best practices the AWS Well-Architected wayAWS Security Maturity Roadmap 2021So You Inherited an AWS Account blog by Matt Fuller

First, we need to understand what makes a system secure?

To say that something got hacked we need to break one of the 3 diagonals of the CIA triad (Confidentiality, Integrity, Availability)

A triangle with three corners: Confidentiality, Integrity, and Availability

Confidentiality

Preventing sensitive information from unauthorized access attempts.

Ex: Data leakage

Integrity:

Maintaining the consistency, accuracy, and trustworthiness of data over its entire lifecycle. Data must not be changed by not authorized people

Ex: A student changing his grades in the university database

Availability:

Information should be consistently and readily accessible for authorized parties (Data can be accessed when we want to)

Ex: DDOS attack

(distributed denial-of-service which occurs when someone tries to visit a website with a lot of devices until the server can’t handle that and crashes and the data becomes unavailable)

Now that we know what is a secure system let’s see what is AWS Security? and how it protects the Confidentiality, Integrity, and Availability of your application

What is AWS Security?

AWS Security Practices

1. Implementing strong password policies

  • Create password requirements that use symbols, numbers, letters, and capital letters
  • Schedule credential resets (every 6 months or so)

2. Implementing 2 Factor Authentication

  • like physical keys, apps like google-authenticator

3. Don’t hard code secrets

4. Use managed IAM policies

5. Follow the AWS News blog

6. Activate all the AWS security controls and services

7. Always use Encryption

8. Keep the Least Privilege Principle in mind

9. Regular data backups

10. Test security (Pentests)

Extra Resources

AWS Security Specialist Certification

AWS Certified Security - Specialty badge

I really recommend taking the AWS Security Specialist exam because:

  • It will teach you how to build and implement solutions that enhance the security of AWS instances.

More info about the exam:

Length: 170 minutes to complete the exam
Cost: 300 USD
Visit Exam pricing for additional cost information.

Format: 65 questions; either multiple choice or multiple response questions

Security best practices the AWS Well-Architected way

AWS Security Maturity Roadmap 2021

https://summitroute.com/blog/2021/01/12/2021_aws_security_maturity_roadmap_2021/

So You Inherited an AWS Account blog by Matt Fuller

https://medium.com/swlh/so-you-inherited-an-aws-account-e5fe6550607d

TAGGED: aws, cloud, cybersecurity, infosec, security

Sign Up For our Weekly Digest

Receive a weekly digest of everything new on Hacktoria

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Noureldin Ehab May 24, 2022
Noureldin Ehab
Posted by Noureldin Ehab
I am nour, I am a second-year software engineering student, I am an AWS Community Builder, IBMz, and Microsoft student ambassador, if you have any questions you can send me a message on LinkedIn : ) https://www.linkedin.com/in/noureldin-ehab-a57940190/
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

About Us

Hacktoria is a passion project run by volunteers.  We aim to create something we enjoy making that provides value to our readers, viewers and players. Our backgrounds vary from Information Technology, Cybersecurity to Data and Law.

Capture the Flag

We provide a Monthly Story Based Capture the Flag exercise. Players solve tasks using OSINT, Hacking, Social Engineering and Cryptographic skills to complete story driven missions. The winner of each competition is written into the fictional story. Participants receive a certificate of completion.

We also offer Practice Labs in various categories. These are intended to improve your investigative skills and provide a good dose of challenge and entertainment.

Articles & Videos

Besides CTF Exercises, our Editorial Team writes Articles about Cybersecurity, OSINT and Technology. We also host a YouTube channel that provides informative content and CTF material. This channel is hosted by Tony, aka “CyberVikingUK“.

HACKTORIAHACKTORIA
Follow US

© 2022 HACKTORIA - Capture the Flag Exercises & Cybersecurity, OSINT and Technology Articles

  • Sitemap
  • Privacy & Disclaimer
Join Us!

Subscribe to our weekly digest!

Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Lost your password?