mirror of
https://github.com/nickpoida/og-aws.git
synced 2025-02-13 02:12:02 +00:00
Security Monkey.
Minor improvements on langauge/formatting.
This commit is contained in:
parent
30d1bc5619
commit
8a8b3b5ed1
1 changed files with 5 additions and 3 deletions
|
@ -367,8 +367,8 @@ So if you’re not going to manage your AWS configurations manually, what should
|
|||
- Ideally, you should only use the AWS Console in a few specific situations:
|
||||
- It’s great for read-only usage. If you’re trying to understand the state of your system, logging in and browsing it is very helpful.
|
||||
- It is also reasonably workable for very small systems and teams (for example, one engineer setting up one server that doesn’t change often).
|
||||
- It can be useful for operations you’re only going to do rarely, like less than once a month. In this case using the console can be the simplest approach.
|
||||
- ❗**Think before you use the console:** The AWS Console is convenient, but also the enemy of automation and reproducibility. If you’re likely to be making the same change multiple times, avoid the console. Favor some sort of automation, or at least have a path toward automation, as discussed next. Not only does using the console preclude automation, which wastes time later, but it prevents documentation, clarity, and standardization around processes for yourself and your team.
|
||||
- It can be useful for operations you’re only going to do rarely, like less than once a month (for example, a one-time VPC setup you probably won’t revisit for a year). In this case using the console can be the simplest approach.
|
||||
- ❗**Think before you use the console:** The AWS Console is convenient, but also the enemy of automation, reproducibility, and team communication. If you’re likely to be making the same change multiple times, avoid the console. Favor some sort of automation, or at least have a path toward automation, as discussed next. Not only does using the console preclude automation, which wastes time later, but it prevents documentation, clarity, and standardization around processes for yourself and your team.
|
||||
|
||||
### Command-Line tools
|
||||
|
||||
|
@ -513,7 +513,9 @@ We cover security basics first, since configuring user accounts is something you
|
|||
- [**Trusted Advisor**](https://aws.amazon.com/blogs/aws/trusted-advisor-console-basic/) addresses a variety of best practices, but also offers some basic security checks around IAM usage, security group configurations, and MFA.
|
||||
- **Use KMS for managing keys**: AWS offers [KMS](#kms) for securely managing encryption keys, which is usually a far better option than handling key security yourself. See [below](#kms).
|
||||
- [**AWS WAF**](https://aws.amazon.com/waf) is a web application firewall to help you protect your applications from common attack patterns.
|
||||
- 🔹**Export and audit security settings:** You can audit security policies simply by exporting settings using AWS APIs, e.g. using a Boto script like [SecConfig.py](https://gist.github.com/jlevy/cce1b44fc24f94599d0a4b3e613cc15d) (from [this 2013 talk](http://www.slideshare.net/AmazonWebServices/intrusion-detection-in-the-cloud-sec402-aws-reinvent-2013)) and then reviewing and monitoring changes manually or automatically.
|
||||
- **Security auditing:**
|
||||
- [Security Monkey](https://github.com/Netflix/security_monkey) is an open source tool to assist with secuirty audits.
|
||||
- 🔹**Export and audit security settings:** You can audit security policies simply by exporting settings using AWS APIs, e.g. using a Boto script like [SecConfig.py](https://gist.github.com/jlevy/cce1b44fc24f94599d0a4b3e613cc15d) (from [this 2013 talk](http://www.slideshare.net/AmazonWebServices/intrusion-detection-in-the-cloud-sec402-aws-reinvent-2013)) and then reviewing and monitoring changes manually or automatically.
|
||||
|
||||
### Security and IAM Gotchas and Limitations
|
||||
|
||||
|
|
Loading…
Reference in a new issue