Hackernoon logoWhat I Learned About Automation From Complying With AWS Security Requirements by@izahedlund

What I Learned About Automation From Complying With AWS Security Requirements

image
Iza Hedlund Hacker Noon profile picture

@izahedlundIza Hedlund

Developer at foreseeti

There are many benefits of Cloud computing, such as flexibility and quick deployments; there are also clear security advantages. But cybersecurity is a shared responsibility between the cloud provider and the customer. The vast majority of Cloud security failures are the customers’ fault. To achieve strong security, we as users need to consider the risks and prioritize cybersecurity in the Cloud.

This is a summary of what I have learned from working with the automated tool securiCAD and compliantly with AWS Security Requirements. Hopefully, it can be of good help to all of you developers and security professionals out there working in AWS.

To help you improve your Cloud security, AWS has developed the AWS Well-Architected Framework. Using the Framework, you will “earn current architectural best practices for designing and operating reliable, secure, efficient, and cost-effective workloads in the cloud”. The Security Pillar of the Framework discusses a number of security foundations including how to operate workloads securely.

Let’s get into the action and dig into some of the key requirements of how to operate workloads securely in AWS.

AWS Requirement 1: Identify and prioritize risks using a threat model

“Identify and prioritize risks using a threat model: Use a threat model to identify and maintain an up-to-date register of potential threats. Prioritize your threats and adapt your security controls to prevent,
detect, and respond. Revisit and maintain this in the context of the
evolving security landscape.”

Threat Modeling is typically a manual process. However, manual Threat Modeling can be very time-consuming, considering the extreme complexity that is growing at the same time as the models themselves. Not to mention the fact that one must prioritize to prevent, detect and respond to threats and that task is simply not possible to do manually, because of the time it would take and since it is too complex for one human brain to handle.

In other words, automated threat modeling taught me that it is possible to analyze complex environments and the process is way more time-efficient than I could ever imagine.

AWS Requirement 2: Identify and validate control objectives

“Identify and validate control objectives: Based on your compliance requirements and risks identified from your threat model, derive and validate the control objectives and controls that you need to apply to your workload. Ongoing validation of control objectives and controls help you measure the effectiveness of risk mitigation.”

As I previously mentioned, the complexity of the environment grows rapidly in regard to the model size but often so do the risks as well. In the best of both worlds, it’s obvious that one would like to fix all potential threats. But, as we all know, that is not possible and what it often boils down to is what risks are most likely to happen and what can we do to prevent them from happening?

Automated tooling provides me with insights on key risks, what measures and controls I need to apply to my environment, and how to prioritize what would be the most efficient use of my time.

AWS Requirement 3: Automate testing and validation of security controls in pipelines

“Automate testing and validation of security controls in pipelines: Establish secure baselines and templates for security mechanisms that are tested and validated as part of your build, pipelines, and processes. Use tools and automation to test and validate all security controls continuously.”

If you ask me, the word continuously and manually doesn’t belong together when it comes to testing and validation of security controls because it is too time-consuming to do manually.

Automated tooling allows me to continuously test my security during the development process. And the best thing of all is that tests are running on a digital twin that did not interfere with the live environment.

To summarize my experience with the Security Requirements from the AWS Well-Architected Framework: Skip the manual Threat Modeling and save yourself and your colleagues some time, use an automated Threat Modeling tool.

Tags

Join Hacker Noon

Create your free account to unlock your custom reading experience.