🔐
AWS SCS-C01
  • Practice Test Scores
  • Domain 1 - Incident Response
    • Incident Response
    • Exposed AWS Access Keys
    • Compromised EC2 Instance
    • How do you report abuse of AWS resources?
    • GuardDuty
    • Penetration Testing
  • Domain 2 - Logging & Monitoring
    • Some Basics
    • Inspector
    • Security Hub
    • AWS WAF
    • Systems Manager
    • Systems Manager Features
    • CloudWatch Logs
    • Athena
    • CloudTrail
    • Config
    • Trusted Advisor
    • CloudTrail Log File Integrity
    • Macie
    • S3 Event Notifications
    • VPC Flow Logs
    • Centralized Logging Architecture
  • Domain 3 - Infrastructure Security
    • Bastion Hosts
    • Site-to-Site VPN
    • VPC Peering
    • VPC Endpoints
    • Network ACL
    • Firewall vs IPS vs IDS
    • EBS
    • CloudFront
    • Shield
    • Mitigating DDoS Attacks
    • EC2 Key Pair Troubleshooting
    • EC2 Tenancy
    • Artifact
    • Lambda@Edge
    • Simple Email Service (SES)
    • DNS Support in VPC
  • Domain 4 - Identity & Access Management
    • Organizations
    • IAM Policy Evaluation Logic
    • Understanding IAM Policies
    • IAM Tutorial: Delegate access across AWS accounts using IAM roles
    • External ID
    • iptables
    • IAM policy elements: Version
    • IAM policy elements: Variables and tags
    • Policy elements: Principal and NotPrincipal
    • IAM policy elements: Condition
    • Security Token Service (STS)
    • Identity federation in AWS
    • Enabling SAML for your AWS resources
    • Single Sign-On
    • Cognito
    • Directory Service
    • Trusts in Active Directory
    • Example S3 Bucket Policies
    • Cross-account access to S3 buckets using Resource-based policies and IAM policies
    • S3 Access Control Lists (ACLs)
    • Presigned URLs
    • S3 Versioning
    • S3 Cross-Region Replication (CRR)
    • S3 Object Lock
    • Configuring MFA-protected API access
    • IAM Permission Boundaries
  • Domain 5 - Data Protection
  • CloudHSM
  • Key Management Service (KMS)
  • Symmetric CMKs vs Asymmetric CMKs
  • Data Key Caching
  • Deleting KMS CMKs
  • Default KMS Key Policy
  • Managing access to KMS CMKs
  • KMS CMK Key Types
  • Rotating KMS CMKs
  • Example Key Policies for KMS Questions
  • KMS Grants
  • KMS CLI Commands
  • Importing key material in KMS
  • KMS Condition Keys
  • Migrating Encrypted KMS Data Across Regions
  • KMS Encryption Context
  • CloudHSM vs KMS
  • S3 Data Encryption
  • Application Load Balancer (ALB)
  • ELB Listeners Part 1
  • ELB Listeners Part 2
  • AWS Certificate Manager (ACM)
  • Glacier
  • DynamoDB Encryption
  • AWS Secrets Manager
  • Summaries
    • Domain 1
    • Domain 2
    • Domain 3
    • Domain 4
    • Domain 5
Powered by GitBook
On this page
  • Exposed AWS Access Keys
  • Compromised EC2 Instance
  • GuardDuty
  • Penetration Testing
  • Abuse of AWS resources
  • authorized_keys
  • CloudTrail

Was this helpful?

  1. Summaries

Domain 1

Exposed AWS Access Keys

  1. Determine what resources those credentials have access to - If the credentials only allow read access to data you intended to make public, you might choose to create new credentials first, transition to these new credentials, and then disable the old credentials.

  2. Invalidate the credentials so they can no longer be used to access your account - Disabling instead of deleting.

  3. Invalidate any temporary security credentials that might have been issued using the credentials.

  4. Restore appropriate access - If you deleted an IAM user, create a new one with a new access key.

  5. Review access to your AWS account - Review all available S3 bucket logs and CloudTrail logs.

Compromised EC2 Instance

  1. Lock the instance down.

  2. Take the EBS Snapshot.

  3. Take a Memory Dump.

  4. Perform Forensic Analysis.

  5. Terminate the instance.

GuardDuty

  • A continuous security monitoring service that analyses and processes the following Data sources: VPC Flow Logs, CloudTrail logs, and DNS logs.

  • Trusted IP lists consist of IP addresses that you have trusted for secure communication with your AWS infrastructure and applications.

  • If you are using a 3rd party DNS resolver, for example, OpenDNS or GoogleDNS, or if you set up your own DNS resolvers, then GuardDuty cannot access and process data from this data source.

  • Super important:

    • In an Active Directory environment, the DNS Resolver is generally set to that of the AD server. So, if the customer DNS resolver is used, Guard Duty will not be able to see the DNS request.

Penetration Testing

  • AWS customers are welcome to carry out penetration tests against their AWS infrastructure without prior approval for 8 services (EC2 instances, NAT Gateways, and Elastic Load Balancers, RDS, CloudFront, Aurora, etc.)

Abuse of AWS resources

  • The AWS Abuse team can assist you if AWS resources are used to engage in an abusive manner, such as: spam, port scanning, DoS attacks, distributing malware, etc.

  • If you suspect that AWS resources are used for abusive purposes, contact the AWS Abuse team using the Report Amazon AWS abuse form, or by contacting abuse@amazonaws.com.

authorized_keys

  • When you launch an instance, you are prompted for a key pair.

  • If you plan to connect to the instance using SSH, you must specify a key pair.

  • You can choose an existing key pair or create a new one.

  • When your instance boots for the first time, the content of the public key that you specified at launch is placed on your Linux instance in an entry within ~/.ssh/authorized_keys.

CloudTrail

  • You can troubleshoot operational and security incidents over the past 90 days in the CloudTrail console by viewing Event history.

  • You can look up events related to creation, modification, or deletion of resources (such as IAM users or EC2 instances) in your AWS account on a per-region basis.

  • Using Athena with CloudTrail logs is a powerful way to enhance your analysis of AWS service activity. For example, you can use queries to identify trends and further isolate activity by attributes, such as source IP address or user.

  • Super important:

    • CloudTrail console stores logs for only 3 months (90 days) and hence any option requiring to view logs greater than 3 months is not a viable option.

    • In cases where older logs need to be retrieved, then we can fetch it from S3 and analyse them.

PreviousAWS Secrets ManagerNextDomain 2

Last updated 4 years ago

Was this helpful?