best practice on aws cloud security
TRANSCRIPT
![Page 1: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/1.jpg)
Best Practice On AWS Cloud
Security
![Page 2: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/2.jpg)
Data security is probably the most important kind of security
measure that you want your cloud platform equipped with.
Amazon web services provide one of the best and secure
cloud services in the market. The proven track record
of AWS security has enabled businesses of all kinds to exist
on the internet.
The digital age made everything easier, especially storage and
dissemination of data.
![Page 3: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/3.jpg)
The sheer amount and size of data stored on the cloud is
incomprehensibly humungous and ever growing.
A lot of this data is confidential and disastrous if ever it is
leaked. There are a number of new ways to hack data and
compromise it.
There have been serious cloud breaches in the past which
have made cloud security a major issue.
![Page 4: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/4.jpg)
Look at major cloud security concerns and how AWS
incorporate security best practices.
![Page 5: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/5.jpg)
Data Breaches
Service Traffic Hijacking
Data Location
Legal Statutes and SLA
Contents:
![Page 6: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/6.jpg)
Data Breaches
![Page 7: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/7.jpg)
If a multitenant cloud administration database isn't composed
and designed appropriately, a solitary imperfection in one
customer's application could permit an attacker to get access
to customer's information, as well as each other customer's
data too.
The threat exists on a multi-level scenario. With Amazon Web
Services, in case of an attack, the incident area is reduced if
the number of host applications using an Amazon Machine
Image (AMI) is less.
![Page 8: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/8.jpg)
Which helps the business to cordons off the affect territory
and will lessens the harm to other data on the same server
and gives best information security rehearses on Amazon
cloud.
![Page 9: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/9.jpg)
Service Traffic Hijacking
![Page 10: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/10.jpg)
On the off chance If an attacker gains access to your
credentials, he or she can track your activities and exchanges,
control information, return distorted data, and divert your
customers to illegitimate sites.
For this situation, AWS ensures delicate information. It could
be client user identity or credentials, passwords, IDs or codes.
For "in flight" (information that is being sent) – AWS utilizes
SSL as that information ought to be scramble/ encrypted.
![Page 11: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/11.jpg)
For “At-rest” data, users can utilize their due-steadiness to
think of static encryption approaches to guarantee document
Integrity. This incorporates utilizing software and tools.
![Page 12: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/12.jpg)
Data Location
![Page 13: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/13.jpg)
Data stored location is likely the most underrated of all
security concerns.
It is easy to envision that an organization might need to keep
its secret information and sensitive documents in a solitary
area and would not have any desire to move them around
excessively.
As the data resides at a physical area, the Cloud provider
ought to give security to servers as indicated by client needs.
![Page 14: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/14.jpg)
Legal Statutes And SLA
![Page 15: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/15.jpg)
The cloud service provider and customers must be sure about
the terms and conditions and purview to be followed in time
of need (read security break).
This could spare a great deal of inconvenience viewing suit for
the customer and also the supplier.
![Page 16: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/16.jpg)
The SLA service level agreement) serves as a contracted level
of ensured administration between the cloud supplier and the
client that indicates what level of guaranteed services will be
given.
AWS has every one of these measures embedded in their
overall cloud service structure.
Amazon additionally decreases the risk of 3rd party APIs
going rogue.
![Page 17: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/17.jpg)
Today, the developer worldview is dynamic to the point that
are utilized to make the data accessible to the masses are the
ones that have defects and are abused by hackers.
Denial of service attacks and different sorts of threats are
managed effortlessly when you have a protected framework
set up.
The AWS firewall works in 'deny all' mode. Users need to open
the ports through which they need the data to experience.
![Page 19: Best Practice On AWS Cloud Security](https://reader031.vdocuments.us/reader031/viewer/2022022414/587565ce1a28abd80a8b508b/html5/thumbnails/19.jpg)
Thank you for Reading!
Would Like to know more? We will be happy to help!
Write to us at: [email protected]
http://www.intelligentia.co.in/
www.facebook.com/intelligentia.in
http://www.twitter.com/_intelligentia
http://www.linkedin.com/company/intelligentia-it-system