Enhance your AWS safety posture, Step 3: Encrypt AWS knowledge in transit and at relaxation

0
72

[ad_1]

Within the first two blogs on this collection, we mentioned correctly organising IAM and avoiding direct web entry to AWS sources. On this weblog, we’ll deal with encrypting AWS in transit and at relaxation.

Generally, regardless of all efforts on the contrary, knowledge could be compromised.  This could happen attributable to knowledge leakage by means of defective apps or methods, by laptops or moveable storage gadgets being misplaced, by malicious actors breaking by means of safety defenses, by social engineering assaults, or by knowledge being intercepted in man-in-the-middle assaults.  Thankfully, with enough encryption measures in place, knowledge exposures reminiscent of these could be nullified.  Merely put, when knowledge is correctly encrypted with trade permitted algorithms, it may well’t be deciphered.  The one approach to make sense of encrypted knowledge is by decrypting it with an encryption key that solely trusted events possess.  Let’s focus on how AWS makes it straightforward to encrypt knowledge wherever it might be.

Encrypting knowledge in transit

Once you go to a web site and see the small lock icon within the browser toolbar, it implies that knowledge being despatched between your pc and the web site host is safe.  In case your knowledge was intercepted by a malicious actor, they might not be capable of decipher it since it’s encrypted. 

Via an encryption course of that’s past the scope of this weblog collection, computer systems and web site hosts negotiate the encryption algorithm and keys which are used throughout periods.  Thus, since solely the speaking computer systems and web site hosts know the encryption keys in use, knowledge is protected against prying eyes.  (Word: an exception to this assertion is that if the technology of encryption keys happens over a publicly out there Web connection (e.g., espresso store WiFi).  Cybercriminals might intercept this trade of knowledge and eavesdrop in your communication. That’s the reason it’s endorsed to provoke a digital non-public community (VPN) connection to a trusted supplier earlier than visiting web sites when utilizing a public Web connection). 

AWS gives a handy service to encrypt knowledge in transit referred to as Amazon Certificates Supervisor (ACM).  Per AWS, ACM “handles the complexity of making, storing, and renewing private and non-private SSL/TLS X.509 certificates and keys that shield your AWS web sites and purposes.”  What Is AWS Certificates Supervisor? – AWS Certificates Supervisor (amazon.com).  These X.509 certificates can be utilized with AWS ELBs, CloudFront, and Amazon API Gateway.  Consequently, all Web sure site visitors to and from these sources can be safe.

Moreover, AWS can encrypt knowledge in transit utilizing X.509 certificates to AWS managed sources like S3 buckets.  Nonetheless, to allow this characteristic insurance policies might should be up to date to limit HTTP and solely allow HTTPS connectivity.  To see an instance of how AWS S3 can implement HTTPS connections, click on right here: Implement TLS 1.2 or greater for Amazon S3 buckets. 

Now that we all know methods to encrypt knowledge in transit, let’s transfer on to our last subject of dialogue – encrypting knowledge at relaxation. 

Encrypting knowledge at relaxation

One of many best and most impactful safety measures AWS has to supply is encrypting knowledge at relaxation.  Actually, with just a few clicks of the mouse, each main AWS service that shops knowledge could be encrypted with default encryption keys which are owned and maintained by AWS.  The service used to carry out these actions is named AWS Key Administration Service (AWS KMS). 

Thus, if for some motive your knowledge was uncovered to the world, it could be illegible with out the encryption key that solely AWS can entry in your behalf.  A fast Google search on the Web will reveal that the period of time used to crack a typical AES-256 encryption key would take trendy computer systems trillions of years – even with the world’s quickest supercomputers. 

If legal guidelines, laws, or company coverage require you to handle your individual encryption keys, AWS has different choices.  Via KMS, AWS clients can import their very own key materials for AWS to make use of for encryption on their behalf.  If clients are not looking for AWS to have any entry to their encryption keys, AWS additionally gives {hardware} safety modules (HSMs).  These could be provisioned and used like a utility with an hourly value. 

AWS HSMs are licensed as FIPS 140-2 compliant.  For these unfamiliar with this designation, it refers to rigorous testing to fulfill authorities permitted safety requirements.  To be taught extra about AWS KMS click on right here: Key Utilization — AWS Key Administration Service — Amazon Net Companies.  To be taught extra about AWS HSM, click on right here: Safety HSM | AWS CloudHSM | Amazon Net Companies. 

As such, contemplating the multitude of choices and ease of use to encrypt knowledge at relaxation, there merely just isn’t an excuse to not encrypt knowledge wherever it’s saved. 

Tying every thing collectively

On this article, now we have mentioned three straightforward steps each enterprise or governmental entity can pursue to dramatically enhance their AWS safety posture.  As a recap, these steps are to 1) arrange and use IAM correctly, 2) keep away from direct Web entry to weak AWS sources, and three) encrypt knowledge in transit or at relaxation.  It goes with out saying that these steps will not be exhaustive.  They’re merely the steps that this writer believes to be probably the most impactful. 

Many different safety mechanisms exist that AWS clients can pursue.  For extra superior AWS safety assist, you’re inspired to have interaction AT&T’s cybersecurity consulting division for assist.  We’re prepared, prepared, and in a position that will help you along with your AWS cybersecurity wants.  To get extra details about AT&T cybersecurity consulting, please click on right here: Cybersecurity Consulting Companies | AT&T Enterprise (att.com). 

Thanks for taking the time to learn this weblog collection.  I sincerely hope you discovered it informative and helpful. 

References:

AWS – https://aws.amazon.com

A Cloud Guru – https://acloudguru.com

[ad_2]