Study Guide890 words

Mastering Security-Specific AWS Solutions: A Professional Study Guide

Security-specific AWS solutions

Mastering Security-Specific AWS Solutions

Improving security on AWS is a continuous process. For the Solutions Architect - Professional exam, you must move beyond basic identity management into advanced threat detection, centralized monitoring, and automated remediation.

Learning Objectives

  • Evaluate existing environments for security vulnerabilities using AWS best practices.
  • Design infrastructure protection strategies using AWS WAF, Shield, and Firewall Manager.
  • Implement centralized security monitoring and automated response mechanisms.
  • Architect data protection strategies including encryption at rest/transit and WORM storage.
  • Leverage the AWS Security Reference Architecture (SRA) for multi-account environments.

Key Terms & Glossary

  • WORM (Write Once, Read Many): A data storage technology that prevents files from being edited or deleted for a set period. Example: Using S3 Object Lock to meet legal requirements for financial records.
  • Finding: A security alert generated by a service like GuardDuty or Inspector that indicates a potential issue. Example: An EC2 instance communicating with a known malicious IP.
  • Automated Remediation: The use of code (Lambda/EventBridge) to automatically fix a security issue. Example: Automatically revoking an IAM key if it is leaked to a public GitHub repository.
  • Immutable Logs: Logs that cannot be modified or deleted. Example: CloudTrail logs sent to a centralized S3 bucket with Object Lock enabled.

The "Big Idea"

Security in a Professional AWS context is not just about locking doors (IAM); it is about Visibility and Automation. By centralizing findings into AWS Security Hub and logs into a Log Archive Account, and then using Amazon EventBridge to trigger AWS Config Rules or Lambda functions, you create a self-healing security posture that operates at the speed of the cloud.

Formula / Concept Box

ConceptTooling / ImplementationCore Requirement
DDoS ProtectionAWS Shield (Standard/Advanced)Availability during Layer 3/4 attacks
Web App FilteringAWS WAFSQL Injection / XSS Mitigation
Data IntegrityS3 Object LockCompliance (WORM)
EncryptionAWS KMS + ACMConfidentiality at Rest & Transit
Compliance DriftAWS ConfigGovernance & Resource History

Hierarchical Outline

  1. Infrastructure Protection
    • AWS WAF: Filtering web traffic at Layer 7; integrated with CloudFront, ALB, and AppSync.
    • AWS Shield: DDoS protection; Shield Advanced provides 24/7 access to the SRT (Shield Response Team).
    • AWS Firewall Manager: Central management of WAF/Shield rules across an entire AWS Organization.
  2. Threat Detection & Analysis
    • Amazon GuardDuty: ML-based threat detection analyzing VPC Flow Logs, DNS logs, and CloudTrail.
    • Amazon Inspector: Automated vulnerability scanning for EC2 instances, ECR images, and Lambda functions.
    • Amazon Macie: Uses ML to discover and protect sensitive data (PII) in S3.
  3. Governance & Compliance
    • AWS Security Hub: The "Single Pane of Glass" that aggregates findings from GuardDuty, Macie, and Inspector.
    • AWS Config: Monitors resource configurations; provides Remediation Actions for non-compliant resources.

Visual Anchors

Security Response Pipeline

Loading Diagram...

Centralized Log Archive Architecture

Compiling TikZ diagram…
Running TeX engine…
This may take a few seconds

Definition-Example Pairs

  • Security Reference Architecture (SRA): A set of patterns for multi-account security. Example: Using a dedicated "Security Tooling" account to host GuardDuty and Security Hub administrators.
  • S3 Object Lock (Compliance Mode): A setting where no one, including the root user, can delete an object. Example: Storing healthcare records that must exist for 7 years by law.
  • AWS Trusted Advisor: A service that inspects your environment and makes security/cost/performance recommendations. Example: An alert showing that an S3 bucket has public read access.

Worked Examples

Scenario: Securing a Global Web Application

Objective: Protect a web app from SQL injection and ensure all logs are immutable for 5 years.

  1. Deployment: Deploy AWS WAF with Managed Rules (SQLi, Core Rule Set) associated with an Amazon CloudFront distribution.
  2. Protection: Enable AWS Shield Advanced for protection against large-scale DDoS attacks.
  3. Logging: Enable CloudTrail to deliver logs to a central S3 bucket in a dedicated Log Archive account.
  4. Integrity: Enable S3 Object Lock on the log bucket with a 5-year retention period in Compliance Mode.
  5. Monitoring: Enable Amazon GuardDuty to monitor for unusual API calls and Security Hub to track compliance against CIS Benchmarks.

Checkpoint Questions

  1. Which service uses Machine Learning specifically to identify sensitive data like Credit Card numbers in S3? (Answer: Amazon Macie)
  2. How does AWS Shield Advanced differ from AWS Shield Standard? (Answer: Advanced provides 24/7 SRT access, cost protection for scaling during attacks, and Layer 7 visibility via WAF)
  3. What is the recommended account structure for centralized logging? (Answer: A dedicated Log Archive account within an AWS Organization)
  4. Can AWS Config automatically fix a resource that is non-compliant? (Answer: Yes, via Remediation Actions using SSM Documents or Lambda)

Muddy Points & Cross-Refs

  • Config vs. Trusted Advisor: People often confuse these. Config is for detailed resource history and custom compliance rules; Trusted Advisor is a high-level automated health check for best practices.
  • GuardDuty vs. Inspector: GuardDuty is network/account behavior (ML); Inspector is host/container vulnerability scanning (CVEs).
  • Cross-Ref: Review Chapter 3 (Multi-Account Environments) to understand how Organizations and Control Tower set the stage for these security tools.

Comparison Tables

ServicePrimary FunctionData Sources
GuardDutyThreat DetectionVPC Flow Logs, DNS Logs, CloudTrail
InspectorVulnerability ManagementEC2 (Agent), ECR Images, Lambda
MacieData Privacy (PII)S3 Buckets
Security HubFinding AggregationFindings from Macie, Inspector, GuardDuty, and 3rd Parties

Ready to study AWS Certified Solutions Architect - Professional (SAP-C02)?

Practice tests, flashcards, and all study notes — free, no sign-up needed.

Start Studying — Free