AWS In Practice
Courses
  • Welcome to AWS In Practice by IT Assist Labs!
  • Courses
    • AWS Powered E-commerce Application: A Guided Tour
      • Lesson Learning Paths
        • Lesson Learning Paths - Certification Prep
        • Lesson Learning Paths - Interview Prep
      • Lesson Summaries
        • Introduction
          • E-commerce Application Architecture
        • Multi-Account Strategy
          • Multi-Account Strategy Overview
          • Organization Units
          • Core Accounts
        • Core Microservices
          • Services Overview
          • AWS Well-Architected design framework application
          • Site Reliability Engineering Application
          • DevOps Application
          • Monitoring, Logging and Observability Application
        • AWS Service By Layer
          • AWS Service By Layer Overview
          • Presentation Layer
          • Business Logic Layer
          • Data Layer
        • E-commerce Application Use Cases
          • E-commerce Application Use Cases
          • Roles
      • Lesson Content Navigation Demonstration
    • Explore a Live AWS Environment Powering an E-commerce Application
  • Resources
    • AWS Certification Guide
      • Concepts
        • Security, Identity & Compliance
          • AWS IAM-Related Concepts in Certification Exams
        • Design High-Performing Architectures
          • Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)
    • Insights
      • Zero Trust Architecture (ZTA)
      • Implementing a Zero Trust Architecture(ZTA) with AWS
      • The Modern Application Development Lifecycle - Blue/Green Deployments
      • Microservices Communication Patterns
    • Interview Preparation
      • AWS Solutions Archictect
  • AWS Exploration
    • Use Cases
      • Multi-Region Resiliency with Active-Active Setup
        • Exploration Summary
    • Foundational Solutions Architect Use Cases
    • Security Engineer / Cloud Security Architect Use Cases
    • DevOps / Site Reliability Engineer (SRE) Use Cases
    • Cloud Engineer / Cloud Developer
    • Data Engineer Use Cases
    • Machine Learning Engineer / AI Practitioner Use Cases
    • Network Engineer (Cloud) Use Cases
    • Cost Optimization / FinOps Practitioner Use Cases
    • IT Operations / Systems Administrator Use Cases
  • Study Group
    • AWS Certified Solutions Architect - Associate
      • Study Guide Introduction
      • Domain 1: Design Secure Architectures
        • Task Statement 1.1: Design secure access to AWS resources
          • SecureCart's Journey
          • AWS Identity & Access Management (IAM) Fundamentals
          • AWS Security Token Service (STS)
          • AWS Organization
          • IAM Identity Center
          • AWS Policies
          • Federated Access
          • Directory Service
          • Managing Access Across Multiple Accounts
          • Authorization Models in IAM
          • AWS Control Tower
          • AWS Service Control Policies (SCPs)
          • Use Cases
            • Using IAM Policies and Tags for Access Control in AWS
        • Task Statement 1.2: Design Secure Workloads and Applications
          • SecureCart Journey
          • Application Configuration & Credential Security
          • Copy of Application Configuration & Credential Security
          • Network Segmentation Strategies & Traffic Control
          • Securing Network Traffic & AWS Service Endpoints
          • Protecting Applications from External Threats
          • Securing External Network Connections
          • AWS Network Firewall
          • AWS Firewall Manager
          • IAM Authentication Works with Databases
          • AWS WAF (Web Application Firewall)
          • Use Cases
            • AWS Endpoint Policy for Trusted S3 Buckets
            • Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network
            • Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL
            • Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53
            • Application Load Balancer (ALB) – Redirecting HTTP to HTTPS
            • Security Considerations in ALB Logging & Monitoring
          • Amazon CloudFront and Different Origin Use Cases
          • Security Group
          • CloudFront
          • NACL
          • Amazon Cognito
          • VPC Endpoint
        • Task Statement 1.3: Determine appropriate data security controls
          • SecureCart Journey
          • Data Access & Governance
          • Data Encryption & Key Management
          • Data Retention, Classification & Compliance
          • Data Backup, Replication & Recovery
          • Managing Data Lifecycle & Protection Policies
          • KMS
          • S3 Security Measures
          • KMS Use Cases
          • Use Cases
            • Safely Storing Sensitive Data on EBS and S3
            • Managing Compliance & Security with AWS Config
            • Preventing Sensitive Data Exposure in Amazon S3
            • Encrypting EBS Volumes for HIPAA Compliance
            • EBS Encryption Behavior
            • Using EBS Volume While Snapshot is in Progress
          • Compliance
          • Implementing Access Policies for Encryption Keys
          • Rotating Encryption Keys and Renewing Certificates
          • Implementing Policies for Data Access, Lifecycle, and Protection
          • Rotating encryption keys and renewing certificates
          • Instance Store
          • AWS License Manager
          • Glacier
          • AWS CloudHSM Key Management & Zeroization Protection
          • EBS
        • AWS Security Services
        • Use Cases
          • IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)
          • Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access
      • Domain 2
        • Task Statement 2.1: Design Scalable and Loosely Coupled Architectures
          • SecureCart Journey
          • API Creation & Management
          • Microservices & Event-Driven Architectures
          • Load Balancing & Scaling Strategies
          • Caching Strategies & Edge Acceleration
          • Serverless & Containerization
          • Workflow Orchestration & Multi-Tier Architectures
        • Task Statement 2.2: Design highly available and/or fault-tolerant architectures
          • SecureCart Journey
          • AWS Global Infrastructure & Distributed Design
          • Load Balancing & Failover Strategies
          • Disaster Recovery (DR) Strategies & Business Continuity
          • Automation & Immutable Infrastructure
          • Monitoring & Workload Visibility
          • Use Cases
            • Amazon RDS Failover Events & Automatic Failover Mechanism
      • Domain 3
        • Task Statement 3.1: Determine high-performing and/or scalable storage solutions
          • SecureCart Journey
          • Understanding AWS Storage Types & Use Cases
          • Storage Performance & Configuration Best Practices
          • Scalable & High-Performance Storage Architectures
          • Hybrid & Multi-Cloud Storage Solutions
          • Storage Optimization & Cost Efficiency
          • Hands-on Labs & Final Challenge
        • Task Statement 3.2: Design High-Performing and Elastic Compute Solutions
          • SecureCart
          • AWS Compute Services & Use Cases
          • Elastic & Auto-Scaling Compute Architectures
          • Decoupling Workloads for Performance
          • Serverless & Containerized Compute Solutions
          • Compute Optimization & Cost Efficiency
        • Task Statement 3.3: Determine High-Performing Database Solutions
          • SecureCart Journey
          • AWS Database Types & Use Cases
          • Database Performance Optimization
          • Caching Strategies for High-Performance Applications
          • Database Scaling & Replication
          • High Availability & Disaster Recovery for Databases
        • Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures
          • SecureCart Journey
          • AWS Networking Fundamentals & Edge Services
          • Network Architecture & Routing Strategies
          • Load Balancing for Scalability & High Availability
          • Hybrid & Private Network Connectivity
          • Optimizing Network Performance
          • Site-to-Site VPN Integration for SAP HANA in AWS
        • Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions
          • SecureCart Journey
          • Data Ingestion Strategies & Patterns
          • Data Transformation & ETL Pipelines
          • Secure & Scalable Data Transfer
          • Building & Managing Data Lakes
          • Data Visualization & Analytics
      • Domain 4
        • Task Statement 4.1: Design Cost-Optimized Storage Solutions
          • SecureCart Journey
          • AWS Storage Services & Cost Optimization
          • Storage Tiering & Auto Scaling
          • Data Lifecycle Management & Archival Strategies
          • Hybrid Storage & Data Migration Cost Optimization
          • Cost-Optimized Backup & Disaster Recovery
        • Task Statement 4.2: Design Cost-Optimized Compute Solutions
          • SecureCart Journey
          • AWS Compute Options & Cost Management Tools
          • Compute Purchasing Models & Optimization
          • Scaling Strategies for Cost Efficiency
          • Serverless & Container-Based Cost Optimization
          • Hybrid & Edge Compute Cost Strategies
          • AWS License Manager
        • Task Statement 4.3: Design cost-optimized database solutions
          • SecureCart Journey
          • AWS Database Services & Cost Optimization Tools
          • Database Sizing, Scaling & Capacity Planning
          • Caching Strategies for Cost Efficiency
          • Backup, Retention & Disaster Recovery
          • Cost-Optimized Database Migration Strategies
        • Task Statement 4.4: Design Cost-Optimized Network Architectures
          • SecureCart Journey
          • AWS Network Cost Management & Monitoring
          • Load Balancing & NAT Gateway Cost Optimization
          • Network Connectivity & Peering Strategies
          • Optimizing Data Transfer & Network Routing Costs
          • Content Delivery Network & Edge Caching
      • Week Nine
        • Final Review Session
        • Final Practice Test
Powered by GitBook

@ 2024 IT Assist LLC

On this page
  • 🔹 CloudFront Security Features
  • 🔹 CloudFront Access Control
  • 🚀 Summary
  1. Study Group
  2. AWS Certified Solutions Architect - Associate
  3. Domain 1: Design Secure Architectures
  4. Task Statement 1.2: Design Secure Workloads and Applications

CloudFront

Amazon CloudFront is a global Content Delivery Network (CDN) that securely delivers content with low latency and high transfer speeds. It helps protect web applications, APIs, and media assets by enforcing access controls, encryption, and security monitoring.

✅ SecureCart’s Use Case

SecureCart uses CloudFront to: ✔ Serve static assets (images, JavaScript, CSS) and API responses with low latency. ✔ Protect against DDoS attacks while securing content delivery. ✔ Restrict unauthorized access to private media files. ✔ Enhance security by encrypting content in transit and at rest.


🔹 CloudFront Security Features

CloudFront provides multiple security layers to protect content from unauthorized access, data breaches, and cyber threats.

Security Feature

Description

Use Case in SecureCart

CloudFront Signed URLs

Grants temporary, controlled access to private content.

SecureCart provides exclusive deals to VIP customers via signed URLs that expire after 24 hours.

CloudFront Signed Cookies

Allows temporary access to multiple private files without changing URLs.

SecureCart provides paying members access to premium product videos using signed cookies.

Origin Access Control (OAC)

Ensures CloudFront is the only entity allowed to fetch objects from S3.

SecureCart restricts direct access to its S3 product image bucket, ensuring only CloudFront can retrieve files.

Field-Level Encryption

Encrypts sensitive form fields before sending them to the origin.

SecureCart protects customer payment information by encrypting sensitive fields in API requests.

AWS WAF Integration

Protects applications from SQL injection, XSS, and DDoS attacks.

SecureCart blocks malicious bots and prevents unauthorized API access using AWS WAF rules.

Geo-Restriction

Blocks access from specific geographic regions.

SecureCart restricts its product listings from appearing in regions where it does not ship.

Origin Shield

Adds an extra caching layer to reduce origin load and mitigate attacks.

SecureCart reduces high traffic spikes from sales events, preventing origin overload.


🔹 CloudFront Access Control

1️⃣ Restricting Access to S3 with Origin Access Control (OAC)

✅ SecureCart ensures that CloudFront is the only service allowed to access its S3 bucket Why? This prevents direct S3 access, forcing requests to go through CloudFront’s security layer.

🔹 Steps to Implement OAC for SecureCart

1️⃣ Enable Origin Access Control (OAC) in CloudFront. 2️⃣ Update the S3 bucket policy to allow CloudFront access only. 3️⃣ Block all public access to the S3 bucket. 4️⃣ Verify secure content delivery through CloudFront.

✅ Use Case: SecureCart’s product images, order invoices, and customer documents are only accessible through CloudFront, not directly from S3.


2️⃣ CloudFront Signed URLs vs. Signed Cookies

Feature

Signed URLs

Signed Cookies

Use Case

Grants access to single files.

Grants access to multiple files in a session.

Best For

Temporary access to a specific download link.

SecureCart’s VIP members accessing multiple premium product videos.

Expiration

URL expires after a defined duration.

Cookie remains valid for a session.

Implementation

Embed the signed URL in email or website.

Set a signed cookie via application logic.

✅ Use Case: SecureCart allows limited-time product demo downloads using signed URLs.


3️⃣ Encrypting Sensitive Data with Field-Level Encryption

CloudFront’s Field-Level Encryption (FLE) allows end-to-end encryption of sensitive data before reaching the origin.

✔ Use Case: SecureCart protects credit card details and customer login credentials by encrypting sensitive fields in checkout forms.

🔹 Implementation Steps: 1️⃣ Create a Field-Level Encryption configuration in CloudFront. 2️⃣ Specify which form fields need encryption (e.g., card_number, CVV). 3️⃣ Use a public key to encrypt data before sending it to the origin. 4️⃣ The origin server decrypts the data using a private key.


4️⃣ Protecting Against Cyber Threats with AWS WAF

SecureCart integrates AWS WAF with CloudFront to block SQL injection, XSS attacks, and DDoS threats.

✔ Use Case: SecureCart’s API Gateway is protected against malicious bots trying to scrape product pricing data.

🔹 Recommended AWS WAF Rules for SecureCart ✅ IP Rate-Based Blocking: Limits excessive API requests. ✅ Geo-Restriction Rules: Blocks traffic from unauthorized countries. ✅ SQL Injection & XSS Protection: Filters malicious input from attackers. ✅ Bot Control Managed Rules: Prevents scraping and spam bots.


5️⃣ Restricting Access with Geo-Restriction

CloudFront’s Geo-Restriction (Geoblocking) prevents content from being accessed in specific countries.

✔ Use Case: SecureCart restricts product content from being accessed in regions where it does not operate.

🔹 Steps to Implement Geo-Restriction: 1️⃣ Enable Geo-Restriction in CloudFront. 2️⃣ Choose "Whitelist" to allow only specific countries or "Blacklist" to block certain regions. 3️⃣ Apply the restriction to the distribution. 4️⃣ Test access from restricted locations.

✅ Example: SecureCart blocks promo videos and special offers from being viewed in countries where its e-commerce store does not operate.


6️⃣ Secure Private APIs Behind CloudFront

SecureCart’s internal APIs need restricted access for authenticated users only.

🔹 Security Measures for Secure API Access: ✔ CloudFront Signed URLs – Grants temporary access to API endpoints. ✔ IAM Authentication & Authorization – Ensures only authorized Lambda/API Gateway invocations. ✔ AWS Shield Advanced Protection – Protects against DDoS attacks on API endpoints. ✔ AWS WAF Web ACL Rules – Blocks malicious requests.

✅ Use Case: SecureCart’s order processing API is only accessible through CloudFront using signed requests.


🚀 Summary

🔹 Amazon CloudFront enhances security by encrypting content, enforcing access controls, and integrating with AWS security services like AWS WAF and AWS Shield. 🔹 SecureCart restricts direct access to S3 using Origin Access Control (OAC). 🔹 Signed URLs & Signed Cookies are used for temporary, secure access to premium content. 🔹 Field-Level Encryption (FLE) ensures sensitive data is protected before reaching the origin. 🔹 AWS WAF protects CloudFront distributions against SQL injection, XSS, and DDoS threats. 🔹 Geo-restriction blocks unauthorized access from specific regions.

PreviousSecurity GroupNextNACL

Last updated 2 months ago