{"id":346,"date":"2023-07-31T01:11:01","date_gmt":"2023-07-31T01:11:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cmayo\/?p=346"},"modified":"2023-07-31T01:11:01","modified_gmt":"2023-07-31T01:11:01","slug":"week-7-aws-evaluation-and-analysis","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cmayo\/2023\/07\/31\/week-7-aws-evaluation-and-analysis\/","title":{"rendered":"Week 7 AWS Evaluation and Analysis"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Analysis<\/h1>\n\n\n\n<ul>\n<li>The AWS environment that I am specifically evaluating is the most common, which is the Elastic Cloud Computing (EC2) Web Service.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">AWS Infrastructure<\/h2>\n\n\n\n<p>Amazon Web Services uses a Shared-Responsibility Model for the Security Infrastructure of their virtual environments, which works tremendously well due to its cloud-based nature. As you can see on AWS\u2019 own model below, AWS secures the background infrastructure that allows your virtual environment to run, the storage, the database accessed and the networking side, while the Client is responsible for the security of their platform, its applications, and general security configurations that you would have on any other network. Leaving the upper layer security of the environment up to the Client allows them to manage and tweak the security based on the clients needs efficiently and effectively.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/sites.wp.odu.edu\/cmayo\/wp-content\/uploads\/sites\/25864\/2023\/07\/Shared_Responsibility_Model_V2.59d1eccec334b366627e9295b304202faf7b899b-1024x561.jpg\" alt=\"\" class=\"wp-image-347\" srcset=\"https:\/\/sites.wp.odu.edu\/cmayo\/wp-content\/uploads\/sites\/25864\/2023\/07\/Shared_Responsibility_Model_V2.59d1eccec334b366627e9295b304202faf7b899b-1024x561.jpg 1024w, https:\/\/sites.wp.odu.edu\/cmayo\/wp-content\/uploads\/sites\/25864\/2023\/07\/Shared_Responsibility_Model_V2.59d1eccec334b366627e9295b304202faf7b899b-300x164.jpg 300w, https:\/\/sites.wp.odu.edu\/cmayo\/wp-content\/uploads\/sites\/25864\/2023\/07\/Shared_Responsibility_Model_V2.59d1eccec334b366627e9295b304202faf7b899b-768x421.jpg 768w, https:\/\/sites.wp.odu.edu\/cmayo\/wp-content\/uploads\/sites\/25864\/2023\/07\/Shared_Responsibility_Model_V2.59d1eccec334b366627e9295b304202faf7b899b-548x300.jpg 548w, https:\/\/sites.wp.odu.edu\/cmayo\/wp-content\/uploads\/sites\/25864\/2023\/07\/Shared_Responsibility_Model_V2.59d1eccec334b366627e9295b304202faf7b899b.jpg 1212w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">AWS Security Controls<\/h2>\n\n\n\n<ul>\n<li>AWS provides heavy security within its networks, as each virtual environment has built-in Firewalls and automatically all traffic for its data storage facilities.<\/li>\n\n\n\n<li>AWS CloudTrail \u2013 Cloud Deployment Management Software<\/li>\n\n\n\n<li>AWS CloudWatch \u2013 Built-In and Scalable Network Monitoring Software<\/li>\n\n\n\n<li>AWS GuardDuty \u2013 Threat Detection Service that can even mitigate several threats without user intervention<\/li>\n\n\n\n<li>AWS IAM \u2013 Multi-Factor Authentication Service and Federated Access For virtual environments<\/li>\n\n\n\n<li>AWS HSM and Key Management \u2013 Amazon Proprietary Hardware Security Module and Cryptographic key Management<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Possible Vulnerabilities<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">No Operator Access<\/h2>\n\n\n\n<p>The AWS Nitro System is the virtualization platform that the EC2 Instance uses to build its applications from. It comes with the previously mentioned security features, with one of them being a lack of AWS Operator Access because of the Shared Responsibility Model. AWS Operators are heavily limited in their access and abilities within a Client\u2019s EC2 environment. This is not a high-level vulnerability, however this stops an AWS Operator from helping secure the environment with debugging the system. In fact, if the Client needed assistance with an issue within the environment, the AWS Operator would have to host a separate environment and try to recreate the issue on their side. Now if there was an issue such as a malicious code in the Operating System that the user didn\u2019t know how to debug, the issue would be hard to recreate for the AWS operator.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">User Misconfigurations<\/h2>\n\n\n\n<p>AWS\u2019 Shared Responsibility Model leaves the responsibility of configuring the environment\u2019s policies and security up to the user. This can lead to major vulnerabilities within the environment due to human error in every part of the user\u2019s configurations. Simple issues such as not using secured ports and lacking enough authentication levels on their endpoints can create significant room for threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Resources<\/h2>\n\n\n\n<p><a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/introduction-aws-security\/welcome.html?did=wp_card&amp;trk=wp_card\">AWS Security Design<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-detectify-labs wp-block-embed-detectify-labs\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"GB2ApGDao5\"><a href=\"https:\/\/labs.detectify.com\/2022\/07\/25\/aws-services-security-vulnerabilities-exploitation-remediation\/\">Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Common Security Vulnerabilities in Core AWS Services: Exploitation and Mitigation&#8221; &#8212; Detectify Labs\" src=\"https:\/\/labs.detectify.com\/2022\/07\/25\/aws-services-security-vulnerabilities-exploitation-remediation\/embed\/#?secret=FVPjAXVIww#?secret=GB2ApGDao5\" data-secret=\"GB2ApGDao5\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/aws.amazon.com\/guardduty\/\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/security-design-of-aws-nitro-system\/security-design-of-aws-nitro-system.html\">What is AWS Nitro System?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/concepts.html\">What is EC2?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analysis AWS Infrastructure Amazon Web Services uses a Shared-Responsibility Model for the Security Infrastructure of their virtual environments, which works tremendously well due to its cloud-based nature. As you can see on AWS\u2019 own model below, AWS secures the background infrastructure that allows your virtual environment to run, the storage, the database accessed and the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cmayo\/2023\/07\/31\/week-7-aws-evaluation-and-analysis\/\">Read More<\/a><\/div>\n","protected":false},"author":21758,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/posts\/346"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/users\/21758"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/posts\/346\/revisions"}],"predecessor-version":[{"id":348,"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/posts\/346\/revisions\/348"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/media?parent=346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/categories?post=346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cmayo\/wp-json\/wp\/v2\/tags?post=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}