AWS In Practice
Courses
  • Welcome to AWS In Practice by IT Assist Labs!
  • Courses
    • AWS Powered E-commerce Application: A Guided Tour
      • Lesson Learning Paths
        • Lesson Learning Paths - Certification Prep
        • Lesson Learning Paths - Interview Prep
      • Lesson Summaries
        • Introduction
          • E-commerce Application Architecture
        • Multi-Account Strategy
          • Multi-Account Strategy Overview
          • Organization Units
          • Core Accounts
        • Core Microservices
          • Services Overview
          • AWS Well-Architected design framework application
          • Site Reliability Engineering Application
          • DevOps Application
          • Monitoring, Logging and Observability Application
        • AWS Service By Layer
          • AWS Service By Layer Overview
          • Presentation Layer
          • Business Logic Layer
          • Data Layer
        • E-commerce Application Use Cases
          • E-commerce Application Use Cases
          • Roles
      • Lesson Content Navigation Demonstration
    • Explore a Live AWS Environment Powering an E-commerce Application
  • Resources
    • AWS Certification Guide
      • Concepts
        • Security, Identity & Compliance
          • AWS IAM-Related Concepts in Certification Exams
        • Design High-Performing Architectures
          • Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)
    • Insights
      • Zero Trust Architecture (ZTA)
      • Implementing a Zero Trust Architecture(ZTA) with AWS
      • The Modern Application Development Lifecycle - Blue/Green Deployments
      • Microservices Communication Patterns
    • Interview Preparation
      • AWS Solutions Archictect
  • AWS Exploration
    • Use Cases
      • Multi-Region Resiliency with Active-Active Setup
        • Exploration Summary
    • Foundational Solutions Architect Use Cases
    • Security Engineer / Cloud Security Architect Use Cases
    • DevOps / Site Reliability Engineer (SRE) Use Cases
    • Cloud Engineer / Cloud Developer
    • Data Engineer Use Cases
    • Machine Learning Engineer / AI Practitioner Use Cases
    • Network Engineer (Cloud) Use Cases
    • Cost Optimization / FinOps Practitioner Use Cases
    • IT Operations / Systems Administrator Use Cases
  • Study Group
    • AWS Certified Solutions Architect - Associate
      • Study Guide Introduction
      • Domain 1: Design Secure Architectures
        • Task Statement 1.1: Design secure access to AWS resources
          • SecureCart's Journey
          • AWS Identity & Access Management (IAM) Fundamentals
          • AWS Security Token Service (STS)
          • AWS Organization
          • IAM Identity Center
          • AWS Policies
          • Federated Access
          • Directory Service
          • Managing Access Across Multiple Accounts
          • Authorization Models in IAM
          • AWS Control Tower
          • AWS Service Control Policies (SCPs)
          • Use Cases
            • Using IAM Policies and Tags for Access Control in AWS
        • Task Statement 1.2: Design Secure Workloads and Applications
          • SecureCart Journey
          • Application Configuration & Credential Security
          • Copy of Application Configuration & Credential Security
          • Network Segmentation Strategies & Traffic Control
          • Securing Network Traffic & AWS Service Endpoints
          • Protecting Applications from External Threats
          • Securing External Network Connections
          • AWS Network Firewall
          • AWS Firewall Manager
          • IAM Authentication Works with Databases
          • AWS WAF (Web Application Firewall)
          • Use Cases
            • AWS Endpoint Policy for Trusted S3 Buckets
            • Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network
            • Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL
            • Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53
            • Application Load Balancer (ALB) – Redirecting HTTP to HTTPS
            • Security Considerations in ALB Logging & Monitoring
          • Amazon CloudFront and Different Origin Use Cases
          • Security Group
          • CloudFront
          • NACL
          • Amazon Cognito
          • VPC Endpoint
        • Task Statement 1.3: Determine appropriate data security controls
          • SecureCart Journey
          • Data Access & Governance
          • Data Encryption & Key Management
          • Data Retention, Classification & Compliance
          • Data Backup, Replication & Recovery
          • Managing Data Lifecycle & Protection Policies
          • KMS
          • S3 Security Measures
          • KMS Use Cases
          • Use Cases
            • Safely Storing Sensitive Data on EBS and S3
            • Managing Compliance & Security with AWS Config
            • Preventing Sensitive Data Exposure in Amazon S3
            • Encrypting EBS Volumes for HIPAA Compliance
            • EBS Encryption Behavior
            • Using EBS Volume While Snapshot is in Progress
          • Compliance
          • Implementing Access Policies for Encryption Keys
          • Rotating Encryption Keys and Renewing Certificates
          • Implementing Policies for Data Access, Lifecycle, and Protection
          • Rotating encryption keys and renewing certificates
          • Instance Store
          • AWS License Manager
          • Glacier
          • AWS CloudHSM Key Management & Zeroization Protection
          • EBS
        • AWS Security Services
        • Use Cases
          • IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)
          • Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access
      • Domain 2
        • Task Statement 2.1: Design Scalable and Loosely Coupled Architectures
          • SecureCart Journey
          • API Creation & Management
          • Microservices & Event-Driven Architectures
          • Load Balancing & Scaling Strategies
          • Caching Strategies & Edge Acceleration
          • Serverless & Containerization
          • Workflow Orchestration & Multi-Tier Architectures
        • Task Statement 2.2: Design highly available and/or fault-tolerant architectures
          • SecureCart Journey
          • AWS Global Infrastructure & Distributed Design
          • Load Balancing & Failover Strategies
          • Disaster Recovery (DR) Strategies & Business Continuity
          • Automation & Immutable Infrastructure
          • Monitoring & Workload Visibility
          • Use Cases
            • Amazon RDS Failover Events & Automatic Failover Mechanism
      • Domain 3
        • Task Statement 3.1: Determine high-performing and/or scalable storage solutions
          • SecureCart Journey
          • Understanding AWS Storage Types & Use Cases
          • Storage Performance & Configuration Best Practices
          • Scalable & High-Performance Storage Architectures
          • Hybrid & Multi-Cloud Storage Solutions
          • Storage Optimization & Cost Efficiency
          • Hands-on Labs & Final Challenge
        • Task Statement 3.2: Design High-Performing and Elastic Compute Solutions
          • SecureCart
          • AWS Compute Services & Use Cases
          • Elastic & Auto-Scaling Compute Architectures
          • Decoupling Workloads for Performance
          • Serverless & Containerized Compute Solutions
          • Compute Optimization & Cost Efficiency
        • Task Statement 3.3: Determine High-Performing Database Solutions
          • SecureCart Journey
          • AWS Database Types & Use Cases
          • Database Performance Optimization
          • Caching Strategies for High-Performance Applications
          • Database Scaling & Replication
          • High Availability & Disaster Recovery for Databases
        • Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures
          • SecureCart Journey
          • AWS Networking Fundamentals & Edge Services
          • Network Architecture & Routing Strategies
          • Load Balancing for Scalability & High Availability
          • Hybrid & Private Network Connectivity
          • Optimizing Network Performance
          • Site-to-Site VPN Integration for SAP HANA in AWS
        • Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions
          • SecureCart Journey
          • Data Ingestion Strategies & Patterns
          • Data Transformation & ETL Pipelines
          • Secure & Scalable Data Transfer
          • Building & Managing Data Lakes
          • Data Visualization & Analytics
      • Domain 4
        • Task Statement 4.1: Design Cost-Optimized Storage Solutions
          • SecureCart Journey
          • AWS Storage Services & Cost Optimization
          • Storage Tiering & Auto Scaling
          • Data Lifecycle Management & Archival Strategies
          • Hybrid Storage & Data Migration Cost Optimization
          • Cost-Optimized Backup & Disaster Recovery
        • Task Statement 4.2: Design Cost-Optimized Compute Solutions
          • SecureCart Journey
          • AWS Compute Options & Cost Management Tools
          • Compute Purchasing Models & Optimization
          • Scaling Strategies for Cost Efficiency
          • Serverless & Container-Based Cost Optimization
          • Hybrid & Edge Compute Cost Strategies
          • AWS License Manager
        • Task Statement 4.3: Design cost-optimized database solutions
          • SecureCart Journey
          • AWS Database Services & Cost Optimization Tools
          • Database Sizing, Scaling & Capacity Planning
          • Caching Strategies for Cost Efficiency
          • Backup, Retention & Disaster Recovery
          • Cost-Optimized Database Migration Strategies
        • Task Statement 4.4: Design Cost-Optimized Network Architectures
          • SecureCart Journey
          • AWS Network Cost Management & Monitoring
          • Load Balancing & NAT Gateway Cost Optimization
          • Network Connectivity & Peering Strategies
          • Optimizing Data Transfer & Network Routing Costs
          • Content Delivery Network & Edge Caching
      • Week Nine
        • Final Review Session
        • Final Practice Test
Powered by GitBook

@ 2024 IT Assist LLC

On this page
  • 📌 Security Group Use Cases & Scenarios
  • 📌 Security Group Best Practices
  • 📌 Common Mistakes
  • 📌 Summary
  1. Study Group
  2. AWS Certified Solutions Architect - Associate
  3. Domain 1: Design Secure Architectures
  4. Task Statement 1.2: Design Secure Workloads and Applications

Security Group

Security Groups act as virtual firewalls for EC2 instances, RDS databases, Lambda functions (VPC-connected), and other AWS resources. They control inbound and outbound traffic based on defined rules.

✅ Key Characteristics of Security Groups

✔ Stateful: If an inbound rule allows traffic, the response is automatically allowed. ✔ Default Deny: All inbound traffic is denied unless explicitly allowed. ✔ Instance-Level Security: Rules apply at the instance level, not the subnet level. ✔ Supports Allow Rules Only: No explicit deny rules like Network ACLs.


📌 Security Group Use Cases & Scenarios

1️⃣ Web Server Access (Public-Facing Application)

Use Case: SecureCart hosts a public e-commerce website that users access via HTTPS. ✅ Allow HTTP (80) and HTTPS (443) from anywhere (0.0.0.0/0). ✅ Allow SSH (22) access only from a trusted IP (e.g., SecureCart’s office network).

Security Group Rules:

Protocol

Port

Source

Purpose

HTTP

80

0.0.0.0/0

Allow public web traffic

HTTPS

443

0.0.0.0/0

Secure web traffic (TLS)

SSH

22

Trusted IP Only

Secure SSH administration

✅ Best Practice:

  • Never expose SSH (22) to 0.0.0.0/0; use trusted IPs or AWS Systems Manager Session Manager.


2️⃣ Database Access in Private Subnet

Use Case: SecureCart uses an RDS database in a private subnet that only backend applications should access. ✅ Allow inbound traffic only from application instances within the VPC.

Security Group Rules:

Protocol

Port

Source

Purpose

MySQL/Aurora

3306

App Server SG

Allow DB connections from the app

PostgreSQL

5432

App Server SG

Allow DB connections from the app

✅ Best Practice:

  • Use Security Group references instead of IP-based rules to allow traffic between instances dynamically.

  • Do not expose database ports to the internet (0.0.0.0/0).


3️⃣ Secure API Gateway with AWS Lambda in a VPC

Use Case: SecureCart runs an API behind API Gateway, triggering a Lambda function that accesses a private RDS instance. ✅ Ensure API Gateway cannot directly access the database. ✅ Use security groups to allow Lambda-to-RDS communication.

Security Group Rules:

Resource

Allowed Traffic

Lambda Function

Outbound to RDS (3306/5432)

RDS Database

Inbound from Lambda SG (3306)

✅ Best Practice:

  • Minimize direct access to databases from the internet.

  • Use VPC Endpoints instead of public API access when possible.


4️⃣ Load Balancer Securing EC2 Instances

Use Case: SecureCart runs its application behind an Application Load Balancer (ALB). ✅ Allow only traffic from the ALB to the EC2 instances. ✅ Allow only the public-facing ALB to receive internet traffic.

Security Group Rules:

Resource

Protocol

Port

Source

Purpose

ALB (Public)

HTTP

80

0.0.0.0/0

Allow public traffic

ALB (Public)

HTTPS

443

0.0.0.0/0

Secure TLS traffic

App Server (Private)

HTTP

80

ALB SG

Only allow traffic from ALB

✅ Best Practice:

  • Restrict ALB access to specific trusted IPs if it’s an internal app.

  • Ensure backend instances accept only ALB traffic, not direct external access.


5️⃣ Secure Remote Access with Bastion Host

Use Case: SecureCart’s engineers need secure access to EC2 instances in private subnets. ✅ Allow SSH only to a bastion host in a public subnet. ✅ Allow private EC2 instances to accept SSH only from the bastion host.

Security Group Rules:

Resource

Protocol

Port

Source

Purpose

Bastion Host

SSH

22

Trusted IPs

Secure engineer access

Private EC2

SSH

22

Bastion Host SG

Allow only bastion access

✅ Best Practice:

  • Use AWS Session Manager instead of a bastion host for increased security.

  • If using a bastion, rotate SSH keys and enable MFA.


6️⃣ Secure Data Transfers with VPC Peering

Use Case: SecureCart has separate VPCs for e-commerce services and payment processing. ✅ Secure cross-VPC communication using VPC peering and security groups.

Security Group Rules:

Resource

Protocol

Port

Source

Purpose

E-commerce App (VPC-1)

HTTPS

443

Payment Processing SG

Secure API calls to payments

Payment Processing (VPC-2)

HTTPS

443

E-commerce App SG

Secure response traffic

✅ Best Practice:

  • Use private DNS resolution for seamless inter-VPC communication.

  • Apply security group rules instead of opening entire subnets.


📌 Security Group Best Practices

✅ Follow the principle of least privilege – Allow only necessary traffic. ✅ Use Security Group references instead of IP addresses when possible. ✅ Regularly audit security groups for unused or overly permissive rules. ✅ Enable AWS Network Firewall or AWS WAF to add an extra layer of protection.


📌 Common Mistakes

❌ Exposing SSH (22) or RDP (3389) to the internet – Use VPN or AWS Systems Manager Session Manager. ❌ Overly broad security group rules (e.g., allowing 0.0.0.0/0) – Always restrict to necessary IPs. ❌ Not reviewing security group changes – Implement AWS Config to track changes. ❌ Assuming security groups replace NACLs – Use NACLs for subnet-level filtering and security groups for instance-level protection.


📌 Summary

🚀 AWS Security Groups provide fine-grained control over inbound and outbound traffic at the instance level, ensuring workload security and compliance. ✔ Use security groups with ALB to restrict backend instance traffic. ✔ Lock down RDS to allow access only from application servers. ✔ Secure VPC peering by limiting inter-VPC traffic with security groups. ✔ Use AWS best practices to enforce strong security and prevent misconfigurations.

Would you like a step-by-step lab guide for implementing security groups in AWS? 🚀

PreviousAmazon CloudFront and Different Origin Use CasesNextCloudFront

Last updated 2 months ago