NACL
- Use to block certain
IP/IP Range
HOST Based Firewall
- Use to block certain
IP/IP Range HOST Based Firewallsare- firewall
- iptables
- ufw
- Windows Firewall
HOST Based Firewallsdo not work whenALBis being used. HereNACLbe used inALB. (Think Why?)
WAF
Web Application Firewall- Used for
Common Security Threats - Check
Origin IPaddress - SQL Injection
- Cross Site Scripting
- Check Headers
- When
Cloudfrontis used, setWAFin front ofCloudfront Rate Based ACL Rulescan be used to avoid potential threat
AWS Shield
- Use to prevent the
DDoSattack
AWS GuardDuty
- Thread detection service
- Used to monitor malicious activity and protect from unauthorized activities
AWS Firewall Manager
- Used to manage the
AWS WAFandAWS Shield
Encryption On Flight (SSL)
- When a data is sending to server over internet, it is encrypted and only the server knows how to decrypt
- Use to prevent MITM (Man In The Middle) attack
Encryption At Rest
- Before data is persist in the server, the data is encrypted and before retrival the data will be decrypted
- Key for encryption and decryption is being managed by another service like KMS
- The server should have permission to access KMS for the encryption and decryption operation
- With
Encryption at Rest, even the server become vulnarable, the will still be safe
Client Side Encryption
- Clients are responsible for encryption and decryption
- Server can not / should not decrypt the data
- This method is utilized by the
Envelope Encryption