Amazon Web Services: Overview of Security Processes

Total Page:16

File Type:pdf, Size:1020Kb

Amazon Web Services: Overview of Security Processes Amazon Web Services: Overview of Security Processes March 2020 For the latest technical content, see Best Practices for Security, Identity & Compliance https://aws.amazon.com/architecture/ security-identity-compliance Archived Notices Customers are responsible for making their own independent assessment of the information in this document. This document: (a) is for informational purposes only, (b) represents current AWS product offerings and practices, which are subject to change without notice, and (c) does not create any commitments or assurances from AWS and its affiliates, suppliers or licensors. AWS products or services are provided “as is” without warranties, representations, or conditions of any kind, whether express or implied. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. © 2020 Amazon Web Services, Inc. or its affiliates. All rights reserved. Archived Contents Introduction .......................................................................................................................... 1 Shared Security Responsibility Model ................................................................................ 1 AWS Security Responsibilities ......................................................................................... 2 Customer Security Responsibilities ................................................................................. 2 AWS Global Infrastructure Security .................................................................................... 3 AWS Compliance Program .............................................................................................. 3 Physical and Environmental Security .............................................................................. 4 Business Continuity Management ................................................................................... 6 Network Security .............................................................................................................. 7 AWS Access ................................................................................................................... 11 Secure Design Principles ............................................................................................... 12 Change Management..................................................................................................... 12 AWS Account Security Features ................................................................................... 14 Individual User Accounts ............................................................................................... 19 Secure HTTPS Access Points ....................................................................................... 19 Security Logs .................................................................................................................. 20 AWS Trusted Advisor Security Checks ......................................................................... 20 AWS Config Security Checks ........................................................................................ 21 AWS Service-Specific Security ......................................................................................... 21 Compute Services .......................................................................................................... 21 NetworkingArchived Services ...................................................................................................... 28 Storage Services ............................................................................................................ 43 Database Services ......................................................................................................... 55 Application Services ....................................................................................................... 66 Analytics Services .......................................................................................................... 73 Deployment and Management Services ....................................................................... 77 Mobile Services .............................................................................................................. 82 Applications .................................................................................................................... 85 Document Revisions.......................................................................................................... 88 Archived Abstract This document is intended to answer questions, such as How does AWS help me ensure that my data is secure? Specifically, this paper describes AWS physical and operational security processes for the network and server infrastructure under the management of AWS. Archived Amazon Web Services Amazon Web Services: Overview of Security Processes Introduction Amazon Web Services (AWS) delivers a scalable cloud computing platform with high availability and dependability, providing the tools that enable customers to run a wide range of applications. Helping to protect the confidentiality, integrity, and availability of our customers’ systems and data is of the utmost importance to AWS, as is maintaining customer trust and confidence. Shared Security Responsibility Model Before covering the details of how AWS secures its resources, it is important to understand how security in the cloud is slightly different than security in your on- premises data centers. When you move computer systems and data to the cloud, security responsibilities become shared between you and your cloud service provider. In this case, AWS is responsible for securing the underlying infrastructure that supports the cloud, and you’re responsible for anything you put on the cloud or connect to the cloud. This shared security responsibility model can reduce your operational burden in many ways, and in some cases may even improve your default security posture without additional action on your part. Archived Figure 1: AWS shared security responsibility model The amount of security configuration work you have to do varies depending on which services you select and how sensitive your data is. However, there are certain security Page 1 Amazon Web Services Amazon Web Services: Overview of Security Processes features—such as individual user accounts and credentials, SSL/TLS for data transmissions, and user activity logging—that you should configure no matter which AWS service you use. For more information about these security features, see the AWS Account Security Features section. AWS Security Responsibilities Amazon Web Services is responsible for protecting the global infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure comprises the hardware, software, networking, and facilities that run AWS services. Protecting this infrastructure is the number one priority of AWS. Although, you can’t visit our data centers or offices to see this protection firsthand, we provide several reports from third-party auditors who have verified our compliance with a variety of computer security standards and regulations. For more information, visit AWS Compliance. Note that in addition to protecting this global infrastructure, AWS is responsible for the security configuration of its products that are considered managed services. Examples of these types of services include Amazon DynamoDB, Amazon RDS, Amazon Redshift, Amazon EMR, Amazon WorkSpaces, and several other services. These services provide the scalability and flexibility of cloud-based resources with the additional benefit of being managed. For these services, AWS handles basic security tasks like guest operating system (OS) and database patching, firewall configuration, and disaster recovery. For most of these managed services, all you have to do is configure logical access controls for the resources and protect your account credentials. A few of them may require additional tasks, such as setting up database user accounts, but overall the security configuration work is performed by the service. Customer Security Responsibilities With the AWS cloud, you can provision virtual servers, storage, databases, and desktops in minutes instead of weeks. You can also use cloud-based analytics and workflow tools to process your data as you need it, and then store it in your own data centersArchived or in the cloud. The AWS services that you use determine how much configuration work you have to perform as part of your security responsibilities. AWS products that fall into the well-understood category of Infrastructure-as-a-Service (IaaS)—such as Amazon EC2, Amazon VPC, and Amazon S3—are completely under your control and require you to perform all of the necessary security configuration and management tasks. For example, for EC2 instances, you’re responsible for management of the guest OS (including updates and security patches), any application Page 2 Amazon Web Services Amazon Web Services: Overview of Security Processes software or utilities you install on the instances, and the configuration of the AWS provided firewall (called a security group) on each instance. These are basically the same security tasks that you’re used to performing no matter where your servers are located. AWS managed services like Amazon RDS or Amazon Redshift provide all of the resources you need to perform a specific task—but without the configuration work that can
Recommended publications
  • Timeline 1994 July Company Incorporated 1995 July Amazon
    Timeline 1994 July Company Incorporated 1995 July Amazon.com Sells First Book, “Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought” 1996 July Launches Amazon.com Associates Program 1997 May Announces IPO, Begins Trading on NASDAQ Under “AMZN” September Introduces 1-ClickTM Shopping November Opens Fulfillment Center in New Castle, Delaware 1998 February Launches Amazon.com Advantage Program April Acquires Internet Movie Database June Opens Music Store October Launches First International Sites, Amazon.co.uk (UK) and Amazon.de (Germany) November Opens DVD/Video Store 1999 January Opens Fulfillment Center in Fernley, Nevada March Launches Amazon.com Auctions April Opens Fulfillment Center in Coffeyville, Kansas May Opens Fulfillment Centers in Campbellsville and Lexington, Kentucky June Acquires Alexa Internet July Opens Consumer Electronics, and Toys & Games Stores September Launches zShops October Opens Customer Service Center in Tacoma, Washington Acquires Tool Crib of the North’s Online and Catalog Sales Division November Opens Home Improvement, Software, Video Games and Gift Ideas Stores December Jeff Bezos Named TIME Magazine “Person Of The Year” 2000 January Opens Customer Service Center in Huntington, West Virginia May Opens Kitchen Store August Announces Toys “R” Us Alliance Launches Amazon.fr (France) October Opens Camera & Photo Store November Launches Amazon.co.jp (Japan) Launches Marketplace Introduces First Free Super Saver Shipping Offer (Orders Over $100) 2001 April Announces Borders Group Alliance August Introduces In-Store Pick Up September Announces Target Stores Alliance October Introduces Look Inside The BookTM 2002 June Launches Amazon.ca (Canada) July Launches Amazon Web Services August Lowers Free Super Saver Shipping Threshold to $25 September Opens Office Products Store November Opens Apparel & Accessories Store 2003 April Announces National Basketball Association Alliance June Launches Amazon Services, Inc.
    [Show full text]
  • AWS Site-To-Site VPN User Guide AWS Site-To-Site VPN User Guide
    AWS Site-to-Site VPN User Guide AWS Site-to-Site VPN User Guide AWS Site-to-Site VPN: User Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. AWS Site-to-Site VPN User Guide Table of Contents What is Site-to-Site VPN ..................................................................................................................... 1 Concepts ................................................................................................................................... 1 Working with Site-to-Site VPN ..................................................................................................... 1 Site-to-Site VPN limitations ......................................................................................................... 2 Pricing ...................................................................................................................................... 2 How AWS Site-to-Site VPN works ........................................................................................................ 3 Site-to-Site VPN Components .....................................................................................................
    [Show full text]
  • Transform Your Business with Amazon Web Services and Salesforce Collaborative Solutions to Innovate Customer Experience
    AWS and Salesforce Transform Your Business with Amazon Web Services and Salesforce Collaborative Solutions to Innovate Customer Experience AWS and Salesforce Together Enterprises around the world need to continually transform their business and the experience they provide their customers to thrive. Doing so however, requires the agility to experiment frequently and the resources to innovate quickly. Amazon Web Services and Salesforce have collaborated to help you fulfll these requirements. By bringing together the world’s most comprehensive and broadly adopted cloud platform with the leading Customer Relationship Management (CRM) ofering, you are able to leverage fully featured services for compute, storage, databases, networking, analytics, machine learning and artifcial intelligence (AI), the Internet of Things (IoT), mobile, security, hybrid, virtual and augmented reality (VR and AR), media, and application development, deployment, and management in tandem with the backbone for your customer engagements. A shared culture of customer-driven innovation means you’ll continually get the latest technology advances at your disposal. Key Benefts AWS and Salesforce share a strategic relationship, encompassing technical alignment and joint development. Many Salesforce products run on AWS. In addition, Salesforce customers can build on AWS to extend their Salesforce capabilities. Whether you are simply using Salesforce SaaS applications that run on AWS, or leveraging AWS to extend Salesforce capabilities, this collaboration provides a multitude
    [Show full text]
  • Amazon Mechanical Turk Developer Guide API Version 2017-01-17 Amazon Mechanical Turk Developer Guide
    Amazon Mechanical Turk Developer Guide API Version 2017-01-17 Amazon Mechanical Turk Developer Guide Amazon Mechanical Turk: Developer Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Amazon Mechanical Turk Developer Guide Table of Contents What is Amazon Mechanical Turk? ........................................................................................................ 1 Mechanical Turk marketplace ....................................................................................................... 1 Marketplace rules ............................................................................................................... 2 The sandbox marketplace .................................................................................................... 2 Tasks that work well on Mechanical Turk ...................................................................................... 3 Tasks can be completed within a web browser ....................................................................... 3 Work can be broken into distinct, bite-sized tasks .................................................................
    [Show full text]
  • In the United States District Court for the Eastern District of Texas Tyler Division
    CaseCase 6:06-cv-00452-LED 6:06-cv-00452-LED Document Document 22 27 Filed Filed 02/20/2007 02/26/07 Page Page 1 of 1 15of 15 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS TYLER DIVISION INTERNATIONAL BUSINESS ) MACHINES CORPORATION, ) ) Plaintiff, ) Civil Action No. 6:06-cv-452 ) JURY v. ) ) AMAZON.COM, INC., AMAZON ) SERVICES LLC F/K/A AMAZON ) SERVICES, INC. D/B/A AMAZON ) ENTERPRISE SOLUTIONS AND ) AMAZON SERVICES BUSINESS ) SOLUTIONS, AMAZON.COM INT’L ) SALES, INC. D/B/A AMAZON.CO.JP, ) AMAZON EUROPEAN UNION S.À.R.L. ) D/B/A AMAZON.DE, AMAZON.FR AND ) AMAZON.CO.UK, AMAZON SERVICES ) EUROPE S.À.R.L. D/B/A AMAZON.DE, ) AMAZON.FR AND AMAZON.CO.UK, ) AMAZON.COM.CA, INC., A9.COM, INC., ) ALEXA INTERNET D/B/A ALEXA ) INTERNET, INC. AND ALEXA ) INTERNET CORP., INTERNET MOVIE ) DATABASE, INC., CUSTOMFLIX LABS, ) INC., MOBIPOCKET.COM SA, ) AMAZON.COM LLC D/B/A ) ENDLESS.COM, BOP, LLC D/B/A ) SHOPBOP.COM, AMAZON WEB ) SERVICES, LLC, AND AMAZON ) SERVICES CANADA, INC., ) ) Defendants. ) FIRST AMENDED COMPLAINT FOR PATENT INFRINGEMENT Plaintiff International Business Machines Corporation (“IBM”), for its First Amended Complaint for Patent Infringement against Defendants Amazon.com, Inc., Amazon Services LLC f/k/a Amazon Services, Inc. d/b/a Amazon Enterprise Solutions and Amazon Services KING/KAPLAN FIRST AMENDED PATENT COMPLAINT DLI-6098701v2 CaseCase 6:06-cv-00452-LED 6:06-cv-00452-LED Document Document 22 27 Filed Filed 02/20/2007 02/26/07 Page Page 2 of 2 15of 15 Business Solutions, Amazon.com Int’l Sales, Inc.
    [Show full text]
  • Liberty Mutual Exhibit 1015
    TIMELINE 2012 July Introduces GameCircle Introduces Game Connect Opens Portal for International Mobile App Distribution June Amazon Publishing Acquires Avalon Books May Amazon Studios to Develop Original Comedy and Children’s Series for Amazon Instant Video April Announces First Quarter Sales up 34% to $13.18 Billion Introduces AmazonSupply Amazon Web Services Introduces AWS Marketplace Introduces eBooks Kindle en Español March Acquires Kiva Systems, Inc. February Launches Sports Collectibles Store January Announces Fourth Quarter Sales up 35% to $17.43 Billion Amazon Web Services Launches Amazon DynamoDB 2011 December Amazon Web Services Launches Brazil Datacenters for Its Cloud Computing Platform Introduces KDP Select Amazon Publishing to Acquire Marshall Cavendish US Children’s Books Titles Page 000001 November Introduces The Kindle Owners’ Lending Library October Announces Third Quarter Sales up 44% to $10.88 Billion September Introduces Amazon Silk Introduces Kindle Fire, Kindle Touch and Kindle Touch 3G Kindle Books Available at Thousands of Local Libraries August Amazon Web Services Announces Global Rollout of Amazon Virtual Private Cloud (Amazon VPC) Introduces Kindle Cloud Reader July Announces Second Quarter Sales up 51% to $9.91 Billion Endless.com Announces International Shipping to over 50 Countries Worldwide AT&T to Sponsor Kindle 3G June Launches AmazonLocal John Locke Becomes First Independently Published Author to Join the "Kindle Million Club" May Announces MYHABIT.COM Amazon.com Now Selling More Kindle Books Than Print
    [Show full text]
  • Accelerate Digital Transformation with Amazon Web Services and Salesforce®
    AWS and Salesforce Accelerate Digital Transformation with Amazon Web Services and Salesforce® AWS and Salesforce Together Amazon Web Services (AWS) and Salesforce have collaborated to help you continually transform your business and the experience you provide to customers. The shared culture of innovation between these industry leaders gives you turnkey, high-performance solutions to drive your digital transformation now, and perpetually updated cutting-edge features for the future. With the collaboration of AWS and Salesforce, you gain the flexibility to experiment and the freedom to innovate faster across customer service, data integration solutions, the voice enabled workplace, and more. Innovative Customer Service with Amazon Connect on Salesforce Service Cloud Rapidly set up and manage a comprehensive contact center that is fully linked to CRM data across sales, commerce, marketing, and more. Data Integration Solutions using AWS Data Services for Salesforce Applications Do more with your Salesforce data by easily and securely integrating it with AWS services for analytics, data lakes, machine learning, and more. Voice Enabled Workplace and Access to Salesforce Data with Alexa for Business Bring the power of Alexa to your workplace to naturally access critical customer data, Einstein Analytics, Insights, and other Salesforce capabilities using just your voice. Start Building with AWS and Salesforce AWS and Salesforce give you new and secure ways to engage with your customers. To learn more, visit aws.amazon.com/featured-partners/Salesforce © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved..
    [Show full text]
  • Press Release
    PRESS RELEASE City of Seal Beach 211 Eighth Street Seal Beach, CA 90740 July 23, 2020 Contact: Sergeant Nick Nicholas FOR IMMEDIATE RELEASE (562) 799-4100 ext. 1160 [email protected] SEAL BEACH POLICE DEPARTMENT JOINS NEIGHBORS APP BY RING SEAL BEACH, CA — The Seal Beach Police Department has joined Neighbors, a free app by Ring, as of Tuesday, July 21, 2020. The Seal Beach Police Department will now be able to use Neighbors as a new way to connect with residents at the local level to provide valuable safety information. Neighbors is a free and simple app that helps community members stay informed of local incidents and share neighborhood safety updates, while keeping their privacy protected. Neighbors brings residents together to have impactful safety conversations and engage with their local public safety agencies on the app in their area to make their neighborhoods safer. The app is available for anyone to use with or without a Ring device. Having an effective and easy means of hyper-local communication with residents is central to public safety and why the Seal Beach Police Department has decided to join Neighbors in their efforts to serve the community. The Seal Beach Police Department is now even better positioned to notify residents of a nearby safety incident, or share proactive tips and emergency preparedness information ahead of time. It’s important to note that local public safety officials do not have access to user cameras, live streams or personal information when using Neighbors. When an individual user chooses to post a video or comment on the app, they are identified only as “Neighbor #” and the location of posts are obscured to protect user privacy.
    [Show full text]
  • Amazon Web Services: Risk and Compliance Amazon Web Services: Risk and Compliance
    Amazon Web Services: Risk and Compliance Amazon Web Services: Risk and Compliance Amazon Web Services: Risk and Compliance Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Amazon Web Services: Risk and Compliance Table of Contents Amazon Web Services: Risk and Compliance .......................................................................................... 1 Abstract .................................................................................................................................... 1 Introduction ...................................................................................................................................... 2 Shared responsibility model ................................................................................................................ 3 Evaluating and integrating AWS controls .............................................................................................. 4 AWS risk and compliance program ....................................................................................................... 5 AWS business risk management ..................................................................................................
    [Show full text]
  • The Warrant Requirement, Tech Exceptionalism, and Ring Security
    5.30.21_MORRIS_FINAL (DO NOT DELETE) 5/30/2021 2:59 PM NOTE SURVEILLANCE BY AMAZON: THE WARRANT REQUIREMENT, TECH EXCEPTIONALISM, & RING SECURITY Justine Morris INTRODUCTION ............................................................................................... 237 I. RING DOORBELLS AND THE NEIGHBORS APP .............................................. 238 A. Ring Security Doorbell Cameras: What They Do & Privacy Implications ................................................................................. 239 B. The Neighbors App: Just a Digital Neighborhood Watch? ............ 243 II. PATHWAYS FOR LAW ENFORCEMENT TO OBTAIN RING FOOTAGE ............ 245 A. Via Neighbors ................................................................................. 247 B. Via the Law Enforcement Portal .................................................... 248 III. HISTORICAL FOUNDATIONS OF THE WARRANT REQUIREMENT ................ 250 IV. CARPENTER IS NEITHER AN EXCEPTION TO AN EXCEPTION, NOR ALL THAT EXCEPTIONAL. ..................................................................................... 252 A. The plain view exception, and Kyllo’s “exception” to it ................ 255 B. The publicly visible movement exception, and Jones’s “exception” to it ................................................................................................... 258 C. The third-party doctrine and Carpenter’s “exception” to it .......... 261 V. APPLYING TECH EXCEPTIONALISM TO POLICE COLLECTION OF RING FOOTAGE. ...........................................................................................
    [Show full text]
  • Amazon Web Services
    Amazon Web Services Commentary to the Advance Notice of Proposed Rulemaking (ANPR) on Enhanced Cyber Risk Management Standards This document is provided for informational and discussion purposes, to assist in the development of the ANPR for Cyber Risk Management document. This document is solely for use of parties who receive it directly from Amazon Web Services. It may not be distributed or forwarded to other parties without the express consent of Amazon Web Services. Not to be distributed or forwarded without the express consent of AWS 1 17 February 2017 February 17, 2017 Robert deV. Frierson Secretary Board of Governors of the Federal Reserve System 20th Street and Constitution Avenue NW Washington, DC 20551 Legislative and Regulatory Activities Division Office of the Comptroller of the Currency 400 7th Street SW Suite 3E-218, mail stop 9W-11 Washington, DC 20219 Robert E. Feldman Executive Secretary Attention: Comments Federal Deposit Insurance Corporation 550 17th Street NW Washington, DC 20429 Via e-mail to: [email protected] (Board of the Federal Reserve (Board)) [email protected] (Office of the Comptroller of Currency (OCC)) [email protected] (Federal Deposit Insurance Corporation (FDIC)) RE: Docket No. R-1550 and RIN 7100-AE-61 (Board) Docket ID OCC-2016-0016 (OCC) RIN 3064-AE45 (FDIC) Amazon comments in response to Banking Agencies’ Advanced Notice of Proposed Rulemaking regarding Enhanced Cyber Risk Management Standards Dear Mr. Frierson, Mr. Feldman, et al.: Amazon Web Services (AWS) welcomes this opportunity to share our comments with the Federal Financial Institutions Examination Council (FFIEC) on the Advance Notice of Proposed Rulemaking (ANPR) on Enhanced Cyber Risk Management Standards (Framework) released for comment in October 2016.
    [Show full text]
  • Overview of Amazon Web Services
    Overview of Amazon Web Services December 2015 Amazon Web Services Overview December 2015 © 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents AWS’s current product offerings and practices as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information in this document and any use of AWS’s products or services, each of which is provided “as is” without warranty of any kind, whether express or implied. This document does not create any warranties, representations, contractual commitments, conditions or assurances from AWS, its affiliates, suppliers or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. Page 2 of 31 Amazon Web Services Overview December 2015 Contents Contents 3 Introduction 4 What Is Cloud Computing? 4 Six Advantages of Cloud Computing 5 Global Infrastructure 5 Security and Compliance 6 Security 6 Compliance 7 Amazon Web Services Cloud Platform 7 Compute 8 Storage and Content Delivery 12 Database 14 Networking 15 Developer Tools 17 Management Tools 17 Security and Identity 19 Analytics 21 Internet of Things 24 Mobile Services 25 Application Services 26 Enterprise Applications 27 Next Steps 28 Conclusion 29 Contributors 29 Document Revisions 29 Notes 29 Page 3 of 31 Amazon Web Services Overview December 2015 Introduction In 2006, Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services—now commonly known as cloud computing.
    [Show full text]