AWS In Practice
Courses
  • Welcome to AWS In Practice by IT Assist Labs!
  • Courses
    • AWS Powered E-commerce Application: A Guided Tour
      • Lesson Learning Paths
        • Lesson Learning Paths - Certification Prep
        • Lesson Learning Paths - Interview Prep
      • Lesson Summaries
        • Introduction
          • E-commerce Application Architecture
        • Multi-Account Strategy
          • Multi-Account Strategy Overview
          • Organization Units
          • Core Accounts
        • Core Microservices
          • Services Overview
          • AWS Well-Architected design framework application
          • Site Reliability Engineering Application
          • DevOps Application
          • Monitoring, Logging and Observability Application
        • AWS Service By Layer
          • AWS Service By Layer Overview
          • Presentation Layer
          • Business Logic Layer
          • Data Layer
        • E-commerce Application Use Cases
          • E-commerce Application Use Cases
          • Roles
      • Lesson Content Navigation Demonstration
    • Explore a Live AWS Environment Powering an E-commerce Application
  • Resources
    • AWS Certification Guide
      • Concepts
        • Security, Identity & Compliance
          • AWS IAM-Related Concepts in Certification Exams
        • Design High-Performing Architectures
          • Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)
    • Insights
      • Zero Trust Architecture (ZTA)
      • Implementing a Zero Trust Architecture(ZTA) with AWS
      • The Modern Application Development Lifecycle - Blue/Green Deployments
      • Microservices Communication Patterns
    • Interview Preparation
      • AWS Solutions Archictect
  • AWS Exploration
    • Use Cases
      • Multi-Region Resiliency with Active-Active Setup
        • Exploration Summary
    • Foundational Solutions Architect Use Cases
    • Security Engineer / Cloud Security Architect Use Cases
    • DevOps / Site Reliability Engineer (SRE) Use Cases
    • Cloud Engineer / Cloud Developer
    • Data Engineer Use Cases
    • Machine Learning Engineer / AI Practitioner Use Cases
    • Network Engineer (Cloud) Use Cases
    • Cost Optimization / FinOps Practitioner Use Cases
    • IT Operations / Systems Administrator Use Cases
  • Study Group
    • AWS Certified Solutions Architect - Associate
      • Study Guide Introduction
      • Domain 1: Design Secure Architectures
        • Task Statement 1.1: Design secure access to AWS resources
          • SecureCart's Journey
          • AWS Identity & Access Management (IAM) Fundamentals
          • AWS Security Token Service (STS)
          • AWS Organization
          • IAM Identity Center
          • AWS Policies
          • Federated Access
          • Directory Service
          • Managing Access Across Multiple Accounts
          • Authorization Models in IAM
          • AWS Control Tower
          • AWS Service Control Policies (SCPs)
          • Use Cases
            • Using IAM Policies and Tags for Access Control in AWS
        • Task Statement 1.2: Design Secure Workloads and Applications
          • SecureCart Journey
          • Application Configuration & Credential Security
          • Copy of Application Configuration & Credential Security
          • Network Segmentation Strategies & Traffic Control
          • Securing Network Traffic & AWS Service Endpoints
          • Protecting Applications from External Threats
          • Securing External Network Connections
          • AWS Network Firewall
          • AWS Firewall Manager
          • IAM Authentication Works with Databases
          • AWS WAF (Web Application Firewall)
          • Use Cases
            • AWS Endpoint Policy for Trusted S3 Buckets
            • Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network
            • Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL
            • Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53
            • Application Load Balancer (ALB) – Redirecting HTTP to HTTPS
            • Security Considerations in ALB Logging & Monitoring
          • Amazon CloudFront and Different Origin Use Cases
          • Security Group
          • CloudFront
          • NACL
          • Amazon Cognito
          • VPC Endpoint
        • Task Statement 1.3: Determine appropriate data security controls
          • SecureCart Journey
          • Data Access & Governance
          • Data Encryption & Key Management
          • Data Retention, Classification & Compliance
          • Data Backup, Replication & Recovery
          • Managing Data Lifecycle & Protection Policies
          • KMS
          • S3 Security Measures
          • KMS Use Cases
          • Use Cases
            • Safely Storing Sensitive Data on EBS and S3
            • Managing Compliance & Security with AWS Config
            • Preventing Sensitive Data Exposure in Amazon S3
            • Encrypting EBS Volumes for HIPAA Compliance
            • EBS Encryption Behavior
            • Using EBS Volume While Snapshot is in Progress
          • Compliance
          • Implementing Access Policies for Encryption Keys
          • Rotating Encryption Keys and Renewing Certificates
          • Implementing Policies for Data Access, Lifecycle, and Protection
          • Rotating encryption keys and renewing certificates
          • Instance Store
          • AWS License Manager
          • Glacier
          • AWS CloudHSM Key Management & Zeroization Protection
          • EBS
        • AWS Security Services
        • Use Cases
          • IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)
          • Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access
      • Domain 2
        • Task Statement 2.1: Design Scalable and Loosely Coupled Architectures
          • SecureCart Journey
          • API Creation & Management
          • Microservices & Event-Driven Architectures
          • Load Balancing & Scaling Strategies
          • Caching Strategies & Edge Acceleration
          • Serverless & Containerization
          • Workflow Orchestration & Multi-Tier Architectures
        • Task Statement 2.2: Design highly available and/or fault-tolerant architectures
          • SecureCart Journey
          • AWS Global Infrastructure & Distributed Design
          • Load Balancing & Failover Strategies
          • Disaster Recovery (DR) Strategies & Business Continuity
          • Automation & Immutable Infrastructure
          • Monitoring & Workload Visibility
          • Use Cases
            • Amazon RDS Failover Events & Automatic Failover Mechanism
      • Domain 3
        • Task Statement 3.1: Determine high-performing and/or scalable storage solutions
          • SecureCart Journey
          • Understanding AWS Storage Types & Use Cases
          • Storage Performance & Configuration Best Practices
          • Scalable & High-Performance Storage Architectures
          • Hybrid & Multi-Cloud Storage Solutions
          • Storage Optimization & Cost Efficiency
          • Hands-on Labs & Final Challenge
        • Task Statement 3.2: Design High-Performing and Elastic Compute Solutions
          • SecureCart
          • AWS Compute Services & Use Cases
          • Elastic & Auto-Scaling Compute Architectures
          • Decoupling Workloads for Performance
          • Serverless & Containerized Compute Solutions
          • Compute Optimization & Cost Efficiency
        • Task Statement 3.3: Determine High-Performing Database Solutions
          • SecureCart Journey
          • AWS Database Types & Use Cases
          • Database Performance Optimization
          • Caching Strategies for High-Performance Applications
          • Database Scaling & Replication
          • High Availability & Disaster Recovery for Databases
        • Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures
          • SecureCart Journey
          • AWS Networking Fundamentals & Edge Services
          • Network Architecture & Routing Strategies
          • Load Balancing for Scalability & High Availability
          • Hybrid & Private Network Connectivity
          • Optimizing Network Performance
          • Site-to-Site VPN Integration for SAP HANA in AWS
        • Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions
          • SecureCart Journey
          • Data Ingestion Strategies & Patterns
          • Data Transformation & ETL Pipelines
          • Secure & Scalable Data Transfer
          • Building & Managing Data Lakes
          • Data Visualization & Analytics
      • Domain 4
        • Task Statement 4.1: Design Cost-Optimized Storage Solutions
          • SecureCart Journey
          • AWS Storage Services & Cost Optimization
          • Storage Tiering & Auto Scaling
          • Data Lifecycle Management & Archival Strategies
          • Hybrid Storage & Data Migration Cost Optimization
          • Cost-Optimized Backup & Disaster Recovery
        • Task Statement 4.2: Design Cost-Optimized Compute Solutions
          • SecureCart Journey
          • AWS Compute Options & Cost Management Tools
          • Compute Purchasing Models & Optimization
          • Scaling Strategies for Cost Efficiency
          • Serverless & Container-Based Cost Optimization
          • Hybrid & Edge Compute Cost Strategies
          • AWS License Manager
        • Task Statement 4.3: Design cost-optimized database solutions
          • SecureCart Journey
          • AWS Database Services & Cost Optimization Tools
          • Database Sizing, Scaling & Capacity Planning
          • Caching Strategies for Cost Efficiency
          • Backup, Retention & Disaster Recovery
          • Cost-Optimized Database Migration Strategies
        • Task Statement 4.4: Design Cost-Optimized Network Architectures
          • SecureCart Journey
          • AWS Network Cost Management & Monitoring
          • Load Balancing & NAT Gateway Cost Optimization
          • Network Connectivity & Peering Strategies
          • Optimizing Data Transfer & Network Routing Costs
          • Content Delivery Network & Edge Caching
      • Week Nine
        • Final Review Session
        • Final Practice Test
Powered by GitBook

@ 2024 IT Assist LLC

On this page
  • Secure Application Configuration & Credentials
  • Implement Network Segmentation & Security
  • Enforce Secure Application Access
  • Protecting Workloads from External Threats
  • Automating Security & Compliance
  1. Study Group
  2. AWS Certified Solutions Architect - Associate
  3. Domain 1: Design Secure Architectures
  4. Task Statement 1.2: Design Secure Workloads and Applications

SecureCart Journey

SecureCart is an AWS-native e-commerce platform that prioritizes security, scalability, and resilience across all workloads. As SecureCart expands, securing workloads and applications becomes a top priority to protect customer data, maintain compliance, and prevent unauthorized access.

This section focuses on how SecureCart secures its applications and workloads in AWS by leveraging AWS security best practices, secure network configurations, and access control mechanisms.


Secure Application Configuration & Credentials

Goal: Prevent credential leaks and unauthorized access to configuration data.

Implementation

  • Use AWS Secrets Manager to store sensitive data such as

    • Database credentials (Amazon RDS PostgreSQL)

    • API keys for payment gateways

    • OAuth tokens for third-party services

  • IAM Role-based access ensures that

    • Only authorized applications retrieve secrets.

    • Developers do not have direct access to production secrets.

  • AWS Systems Manager Parameter Store manages non-sensitive application configurations securely.

Use Case: SecureCart’s ECS Fargate tasks retrieve RDS credentials from AWS Secrets Manager, ensuring credentials are never stored in application code.


Implement Network Segmentation & Security

Goal: Enforce network-level security to isolate workloads and minimize exposure.

Implementation

  • VPC Architecture & Segmentation

    • Public Subnets → Only for Load Balancers (ALB) and API Gateway.

    • Private Subnets → Application servers, RDS databases, and backend services.

  • Security Groups

    • Restrict inbound/outbound access for each application component.

Security Group Rules for SecureCart Components

Component

Traffic Type

Source

Port Range

Direction

Purpose

Application Load Balancer (ALB)

HTTP/HTTPS

0.0.0.0/0 (Public)

80, 443

Inbound

Accepts web traffic from customers.

Application Load Balancer (ALB)

HTTP/HTTPS

VPC CIDR

80, 443

Outbound

Sends traffic to backend services.

ECS/EC2 Backend Services

HTTP

ALB Security Group

8080

Inbound

Only allows traffic from ALB.

ECS/EC2 Backend Services

Database

RDS Security Group

5432

Inbound

Allows backend services to connect to RDS.

ECS/EC2 Backend Services

All

Internet

Deny

Inbound

Blocks direct internet access.

ECS/EC2 Backend Services

HTTPS

S3 (AWS Services)

443

Outbound

Allows secure connection to AWS services like S3.

Amazon RDS (PostgreSQL)

Database

ECS/EC2 Backend Security Group

5432

Inbound

Ensures only backend services can access the database.

Amazon RDS (PostgreSQL)

All

Internet

Deny

Inbound

Blocks unauthorized direct database access.

Lambda Functions

HTTPS

Internet

443

Outbound

Allows Lambda to interact with AWS APIs securely.

  • Network ACLs (NACLs)

    • Provide additional filtering for subnet-level control.

Network ACL (NACL) Rules for SecureCart Subnets

Rule #

Subnet Type

Traffic Type

Source/Destination

Port Range

Direction

Action

Purpose

100

Public Subnet (ALB)

HTTP/HTTPS

0.0.0.0/0 (Internet)

80, 443

Inbound

Allow

Allows public web traffic to ALB.

110

Public Subnet (ALB)

All

0.0.0.0/0

All

Inbound

Deny

Blocks all other inbound traffic.

120

Public Subnet (ALB)

HTTP/HTTPS

VPC CIDR

80, 443

Outbound

Allow

Allows traffic to backend services.

130

Public Subnet (ALB)

All

0.0.0.0/0

All

Outbound

Deny

Blocks unintended outbound traffic.

200

Private Subnet (ECS/Backend Services)

HTTP

Public Subnet (ALB)

8080

Inbound

Allow

Allows ALB to send traffic to backend services.

210

Private Subnet (ECS/Backend Services)

Database

Database Subnet

5432

Inbound

Allow

Allows backend services to connect to RDS.

220

Private Subnet (ECS/Backend Services)

All

0.0.0.0/0

All

Inbound

Deny

Blocks all other inbound traffic.

230

Private Subnet (ECS/Backend Services)

HTTPS

0.0.0.0/0

443

Outbound

Allow

Allows secure AWS API access (e.g., S3, Secrets Manager).

300

Database Subnet (RDS)

Database

Private Subnet (ECS)

5432

Inbound

Allow

Ensures only backend services can access the database.

310

Database Subnet (RDS)

All

0.0.0.0/0

All

Inbound

Deny

Blocks unauthorized database access.

320

Database Subnet (RDS)

All

0.0.0.0/0

All

Outbound

Deny

Prevents unintended outbound connections.

  • AWS WAF (Web Application Firewall)

    • Protects API Gateway and ALB from attacks like SQL Injection and XSS.

The following AWS WAF rule set is applied to SecureCart’s ALB and API Gateway.

Rule Name

Type

Action

Purpose

Block SQL Injection

AWS Managed Rule

Block

Prevents SQL Injection attempts targeting API requests.

Block XSS Attacks

AWS Managed Rule

Block

Protects against JavaScript injection in web forms.

Rate Limiting

Rate-Based Rule

Block if > 100 requests in 5 min

Prevents bot-driven brute force attacks.

Block Known Malicious IPs

IP Reputation List

Block

Uses AWS Threat Intelligence feeds to block malicious actors.

Block Requests from Unapproved Countries

Geo-Blocking

Block

Restricts access to SecureCart’s API to U.S. and Europe only.

AWS WAF automatically updates managed rulesets, ensuring continuous protection against evolving threats.

  • AWS Shield

    • Defends SecureCart against DDoS attacks on its public endpoints.

Use Case: SecureCart’s RDS database is placed in a private subnet, ensuring only ECS tasks can connect through Security Groups and blocking all external access.


Enforce Secure Application Access

Goal: Implement strong authentication and authorization mechanisms to prevent unauthorized access.

Implementation

  • Amazon Cognito for Authentication

    • SecureCart customers authenticate via Cognito User Pools before accessing the platform.

  • IAM Role-based Access for Services

    • ECS tasks assume IAM roles to interact with S3 and DynamoDB.

    • Lambda functions assume roles to process customer orders securely.

  • API Gateway Authorization

    • Enforces Cognito-based authentication for API endpoints.

Use Case: SecureCart’s API Gateway allows only authenticated Cognito users to fetch order history, ensuring unauthorized requests are blocked.


Protecting Workloads from External Threats

Goal: Detect, prevent, and mitigate security threats targeting SecureCart’s workloads.

Implementation

  • AWS GuardDuty

    • Monitors for anomalous API calls, unauthorized access attempts, and data exfiltration.

  • AWS WAF Rules

    • Blocks malicious traffic such as SQL Injection and XSS attacks.

  • AWS Config

    • Ensures compliance by checking security settings (e.g., encrypted S3 buckets, security group rules).

  • AWS CloudTrail

    • Logs every API request for security auditing and investigation.

Use Case: If AWS GuardDuty detects a brute-force attack, SecureCart automatically updates WAF rules to block the attacker’s IP.


Automating Security & Compliance

Goal: Continuously enforce security controls and automatically respond to threats.

Implementation

  • AWS Security Hub

    • Centralizes security findings across GuardDuty, AWS Config, and IAM Access Analyzer.

  • AWS Lambda for Automated Security Remediation

    • Automatically revokes excessive permissions when detected.

    • Disables unused IAM access keys.

  • IAM Access Analyzer

    • Identifies unintended public access to resources.

  • AWS Config Rules

    • Ensures encryption is enabled for S3, RDS, and EBS volumes.

Use Case: SecureCart enforces automatic encryption for new S3 buckets using an AWS Config rule, preventing misconfigurations.

PreviousTask Statement 1.2: Design Secure Workloads and ApplicationsNextApplication Configuration & Credential Security

Last updated 2 months ago