01
AWS Shared Responsibility Model
AWS secures the cloud infrastructure. You are responsible for security in the cloud โ everything you configure, deploy, and operate.
| AWS Secures | Customer Secures |
|---|
| Physical infrastructure | IAM configuration and policies |
| Hardware and hypervisor | OS on EC2 instances |
| Core AWS services | Network configuration (VPCs, security groups) |
| Availability and durability | Application code and data encryption |
| Physical security | Monitoring and incident response |
The most common AWS breaches are identity-related: over-permissive IAM roles, exposed access keys, and misconfigured S3 buckets. All are customer-configuration issues, not AWS platform vulnerabilities.
02
IAM: Identity and Access Management
Least Privilege Principles
โNo use of the root account for daily operations โ create admin IAM users or use SSO
โAssign IAM policies at minimum required scope โ never attach AdministratorAccess unless absolutely required
โUse IAM roles for EC2 instances and Lambda functions โ not access keys embedded in code
โRotate access keys regularly โ audit and delete unused keys
AWS IAM Identity Center (SSO)
โCentralise access management across multiple AWS accounts
โIntegrate with Entra ID or Okta for single sign-on
โEnforce MFA at the identity provider level
โUse permission sets to assign AWS account access โ not individual IAM user policies
Service Control Policies
โIn multi-account environments, use SCPs to set guardrails across the organisation
โBlock services from being used in certain regions
โPrevent disabling of CloudTrail or GuardDuty across the organisation
03
Threat Detection: GuardDuty and Security Hub
Amazon GuardDuty
GuardDuty continuously analyses CloudTrail logs, VPC Flow Logs, and DNS logs to detect threats. It requires minimal configuration โ enable it and it starts producing findings immediately.
โEnable GuardDuty in all AWS regions โ threats may originate in regions you're not actively using
โConfigure GuardDuty findings to flow to Security Hub for centralised management
โReview GuardDuty findings weekly โ prioritise High and Critical severity findings
โEnable GuardDuty S3 protection โ detect malicious access to S3 buckets
AWS Security Hub
โCentralises findings from GuardDuty, Inspector, Macie, and third-party tools
โChecks against security standards: CIS AWS Foundations, AWS Foundational Security Best Practices
โProvides Security Score โ overall posture metric across your accounts
โAggregate findings across multiple accounts in an AWS Organisation
04
Logging: CloudTrail and CloudWatch
Logging without analysis is noise. But without logging, you have no audit trail when something goes wrong.
โEnable CloudTrail in all regions, in all accounts โ log all management and data events
โConfigure CloudTrail logs to an S3 bucket with MFA delete โ prevents attackers from deleting evidence
โEnable CloudTrail log file integrity validation โ detect tampering
โCloudWatch Alarms โ alert on root account usage, API error rates, failed authentication attempts
โVPC Flow Logs โ capture network traffic metadata for all VPCs
CloudTrail is the forensic audit trail for everything that happens in your AWS account. Without it, incident investigation is nearly impossible. Enable it now if you haven't.
05
Workload and Data Security
EC2 Instances
โPatch OS and applications regularly โ use AWS Systems Manager Patch Manager
โEnable Amazon Inspector โ automated vulnerability scanning for EC2 and containers
โEnforce IMDSv2 โ prevents SSRF attacks against instance metadata
โSecurity Groups: deny by default, allow by exception โ no 0.0.0.0/0 ingress unless absolutely required
S3 Security
โBlock public access at account level โ unless specific buckets require it
โEnable S3 server-side encryption by default โ AWS KMS or S3-managed keys
โEnable Amazon Macie โ automatically discover and protect sensitive data in S3
โS3 bucket policies: least privilege, no wildcard Principal unless required
Encryption
โEnable encryption at rest for all storage: EBS, S3, RDS, DynamoDB
โUse AWS KMS customer-managed keys for sensitive data โ not AWS-managed keys
โEnable encryption in transit โ TLS 1.2 minimum, enforce HTTPS on all endpoints
06
De4sec AWS Security Service
Security Assessment
Review AWS environment against CIS benchmarks and AWS Foundational Security Best Practices. Produce prioritised remediation plan.
Security Baseline
Implement GuardDuty, Security Hub, CloudTrail, IAM hardening, and network security controls.
Ongoing Monitoring
GuardDuty and Security Hub alert monitoring. Weekly findings review. Monthly compliance report.
Incident Response
When a GuardDuty finding indicates active threat: containment, investigation, remediation, post-incident report.