標籤:des style http color os io 使用 strong ar
- 加密所有網路通訊;
- 只使用加密的檔案系統;
- 高強度加密您放在S3上所有檔案;
- 絕對不能讓解密的密鑰進入雲,除非用於解密進程;
- 除了用於解密檔案系統的密鑰外,絕對不能在AMI中放置使用者的認證認證;
在執行個體啟動時解密使用者的檔案系統;
- Shell訪問時絕對永遠不能使用簡單的使用者名稱/密碼認證方式;
- Sudo訪問時不要求輸入密碼;
- 設計你的系統,使你的應用程式不依賴於特定的AMI結構;
- 定期把你的資料從亞馬遜雲中完整備份出來,並且在其他地方安全保管;
- 每個EC2執行個體只運行一個服務;
- 只開啟執行個體中的服務所需的最少的連接埠;
- 設定你的執行個體時指定源IP地址;僅對HTTP / HTTPS等開放全域訪問;
- 把敏感性資料和非敏感性資料存放在不同的資料庫中,並且在不同的安全性群組中;
- 自動化安全的尷尬—不可靠,但有時還得用;
- 安裝基於主機的入侵偵測系統,如OSSEC;
- 充分利用系統強化工具,如巴士底獄Linux;
- 如果你懷疑被駭客入侵,則趕緊備份根檔案系統、快照塊卷,並關閉該執行個體。您可以稍後在一個沒有被入侵的系統上取證研究;
- 設計一個程式可以給AMI打安全補丁,只需簡單地重啟你的執行個體;
- 最重要的是:編寫安全的Web應用程式。
(譯自 Twenty Rules for Amazon Cloud Security)
Encrypt all network traffic.
Use only encrypted file systems for block devices and non-root local devices.
Encrypt everything you put in S3 using strong encryption.
Never allow decryption keys to enter the cloud—unless and only for the duration of an actual decryption activity.
Include NO authentication credentials in your AMIs except a key for decrypting the file system key.
Pass in your file system key encrypted at instance start-up.
Do not allow password-based authentication for shell access. Ever.
Do not require passwords for sudo access.
Design your systems so that you do not rely on a particular AMI structure for your application to function.
Regularly pull full backups out of Amazon and store them securely elsewhere.
Run only one service per EC2 instance.
Open only the minimum ports necessary to support the services on an instance.
Specify source addresses when setting up your instance; only allow global access for global services like HTTP/HTTPS.
Segment out sensitive data from non-sensitive data into separate databases in separate security groups when hosting an application with highly sensitive data.
Automate your security embarrassments.
Install a host-based intrusion detection system like OSSEC.
Leverage system hardening tools like Bastille Linux.
If you suspect a compromise, backup the root file system, snapshot your block volumes, and shut down the instance. You can perform forensics on an uncompromised system later.
Design things so you can roll out a security patch to an AMI and simply relaunch your instances.
Above all else, write secure web applications.
亞馬遜雲安全20條規則