In today's world more and more companies decide to move their businesses to a cloud. It means that the success of a company is more dependent on those cloud services. While some security responsibilities are taken by the provider, the configuration and management of the cloud environment is still among the duties of the customer. There are thousands of stories showing that this task is not a trivial one.
During the AWS security course you will learn key security concepts on how to stay secure and compliant using the AWS cloud. The course is designed to be as much practical as possible containing common pitfalls in form of hands-on labs. During the labs you do not only learn how to properly configure AWS services, but you will also find misconfigurations there from an attacker perspective and get to know how to fix it.
Furthermore, we will go through AWS security services -- what they are and how to use them effectively in order to detect and prevent any malicious action. The course also covers what to do once you already got hacked to better prepare you for meeting the wild world.
title: AWS security
duration: normal: 1.5 days (9hrs education time); extended: 2 days
developed by: Paweł Rzepa
- AWS account (can be free tier)
- a laptop with:
- git (the exact repositories to clone will be provided before the course)
- AWS CLI
* -- available in the extended course version
- Shared Responsibility Model, Security in AWS
- IAM users, IAM groups, profile identities, IAM policies, roles
- Labs: privilege escalation in AWS
- Bucket policies vs ACLs, conflicting policies, encryption, Cross Region Replication, S3 and CloudFront, pre-signed URLs
- Lab: detecting S3 misconfigurations and detecting leaks in stored data
- CloudTrail, CloudWatch, AWS Config, AWS Inspector & Trusted Advisor
- Labs: Bypassing CloudTrail, Setting up AWS Config and CloudWatch Events to prevent it
- VPC, NAT instances vs NAT Gateways, NACLs vs Security Groups, Bastions, VPC Flow Logs
- Labs*: setting up VPC and data exfiltration
- KMS, Key Pairs in EC2 and LightSail, WAF, AWS Shield
- Steps to take after being hacked or loosing keys, Reading CloudTrail logs, Pentesting in AWS, AWS Certificate Manager, AWS System Managers, Compliance in AWS