Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Here are some of the high level things we’d want in terms of security

  • General

    • Reject by default - start with the least amount of permissions across the board (users, machines, services, access)

    • There should be no need for services to send traffic externally, this should be locked down

    • NACL’s to provide a second layer of security to ensure many mistakes with security groups don’t leave service wide open

  • Encryption

    • In transit - this is relation to network traffic

    • At rest - when data is stored on disk (either as files or in a form of a database)

    • Network traffic within the VPC must be encrypted

    • Inbound network traffic on HTTP must be redirected to use HTTPS

  • Security groups

    • These behave like firewalls which limit (reject) certain types of traffic - can be attached to many types of resources

    • Many finely grained groups, named appropriately and not shared between VPC’s

    • Chained where it makes sense

  • WAF (Web application firewall)

    • Where it makes sense, to be placed in front of any application that receives traffic sourced externally

  • Controlled networking routes

    • Resources can only be reached via certain routes

    • No public IP’s

    • Applications must be stored in privates subnets with no direct accessible route from outside the VPC

...