🕹️
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • 🗃️Exam Prep Notes
    • 📔CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • 📘ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • 📗AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • 📗SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • 📔AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • 🧑‍💻Cyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • ☁️Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • 🕸️Network Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • 🧑‍💻VAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • ☄️GRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • 🔍Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • 🕹️Server are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • 🙍‍♂️Dan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • 🛡️Security Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  1. Cyber Security Base
  2. Cloud Security

Amazon Web Services (AWS)

AWS offers a wide range of cloud security services designed to help users protect their applications, data, and infrastructure in the cloud. These services cover various aspects of security, such as identity and access management, encryption, network security, threat detection, and compliance.

Key AWS Cloud Security Services:

  1. Identity and Access Management (IAM):

    • IAM: Manages access to AWS services and resources securely. It allows you to create and manage users, groups, and roles, and define fine-grained permissions to control who can access what resources.

  2. AWS Key Management Service (KMS):

    • KMS: A fully managed service that allows you to create, store, and manage encryption keys for your applications. It helps secure data at rest and ensures that data encryption and decryption are controlled and auditable.

  3. AWS Shield:

    • AWS Shield: A managed DDoS (Distributed Denial of Service) protection service that helps protect AWS applications from attacks. It has two tiers:

      • AWS Shield Standard: Protects against common, small-scale DDoS attacks.

      • AWS Shield Advanced: Provides enhanced protection for more complex and sophisticated attacks, with 24/7 access to the AWS DDoS response team.

  4. AWS Web Application Firewall (WAF):

    • AWS WAF: A web application firewall that helps protect web applications from common web exploits, such as SQL injection, cross-site scripting (XSS), and other OWASP Top 10 vulnerabilities. WAF allows you to configure custom security rules to block malicious traffic.

  5. AWS Security Hub:

    • Security Hub: A security management service that provides a comprehensive view of your security posture across AWS accounts. It aggregates and prioritizes security findings from various AWS services and partner solutions, helping you monitor and automate security response.

  6. AWS CloudTrail:

    • CloudTrail: A service that enables governance, compliance, and operational auditing by logging API calls made within your AWS environment. CloudTrail provides a record of actions taken by users, services, or AWS resources, which is crucial for detecting and investigating suspicious activity.

  7. AWS GuardDuty:

    • GuardDuty: A threat detection service that continuously monitors AWS accounts and workloads for malicious activity and unauthorized behavior. It uses machine learning, anomaly detection, and integrated threat intelligence to identify threats like compromised instances or unauthorized API calls.

  8. Amazon Macie:

    • Macie: A data security service that uses machine learning to discover, classify, and protect sensitive data like personally identifiable information (PII) stored in AWS S3. Macie helps automate the identification of data privacy risks and regulatory compliance.

  9. AWS Config:

    • Config: A service that provides resource configuration history and compliance auditing. It helps you monitor and track configuration changes to AWS resources and ensures compliance with internal policies and regulatory requirements.

  10. Amazon Inspector:

    • Inspector: An automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It performs security assessments on EC2 instances and containerized workloads to identify vulnerabilities and deviations from best practices.

  11. AWS Secrets Manager:

    • Secrets Manager: A service for managing and rotating sensitive information such as database credentials, API keys, and other secrets. Secrets Manager helps ensure that your applications have secure access to the required credentials without hardcoding them in your code.

  12. AWS VPN & AWS Direct Connect:

    • AWS VPN: A service that allows you to create a secure, encrypted connection between your on-premises network and your AWS environment.

    • AWS Direct Connect: A dedicated network connection between your premises and AWS that provides a private and secure data transfer path, bypassing the public internet.

  13. VPC (Virtual Private Cloud):

    • VPC: Allows you to define a logically isolated network within the AWS cloud, where you can launch AWS resources securely. VPC provides network-level security through security groups, network access control lists (ACLs), and private subnets.

  14. AWS Artifact:

    • AWS Artifact: A service that provides on-demand access to AWS’s compliance reports and security certifications, helping you meet regulatory and compliance requirements like SOC, PCI-DSS, GDPR, etc.

  15. AWS CloudHSM:

    • CloudHSM: A hardware-based key management solution that provides secure key storage for cryptographic operations in the cloud. It enables customers to comply with stringent regulatory requirements for cryptographic key management.

  16. AWS Detective:

    • Detective: A service that analyzes and visualizes the relationships between AWS resources to help with security investigations. It integrates with GuardDuty and CloudTrail to help identify the root cause of security incidents.


Sections for this module :

Sr . NO
Modules of AWS

1

AWS IAM & Policy Management

2

AWS Organization

3

AWS Roles & Assume role feature

4

AWS EC2 Guide

5

AWS VPC - Virtual Private Cloud

6

AWS Bastion Host

7

AWS ALB - Application Load Balancer

8

AWS Auto Scaling Configuration

9

AWS WAF - Web Application Firewall

10

AWS - VPC Peering connection

11

AWS Transit Gateway

12

AWS NAT Gateway

13

AWS Route 53

14

AWS Certificates Manger

15

AWS NLB (Network Load Balancer)

PreviousCloud SecurityNextAWS - IAM & Policy Management

Last updated 3 months ago

🧑‍💻
☁️