亞馬遜雲安全20條規則

來源:互聯網
上載者:User

標籤:des   style   http   color   os   io   使用   strong   ar   

  • 加密所有網路通訊;
  • 只使用加密的檔案系統;
  • 高強度加密您放在S3上所有檔案;
  • 絕對不能讓解密的密鑰進入雲,除非用於解密進程;
  • 除了用於解密檔案系統的密鑰外,絕對不能在AMI中放置使用者的認證認證;
  • 在執行個體啟動時解密使用者的檔案系統;

  • Shell訪問時絕對永遠不能使用簡單的使用者名稱/密碼認證方式;
  • Sudo訪問時不要求輸入密碼;
  • 設計你的系統,使你的應用程式不依賴於特定的AMI結構;
  •  定期把你的資料從亞馬遜雲中完整備份出來,並且在其他地方安全保管;
  •  每個EC2執行個體只運行一個服務;
  •  只開啟執行個體中的服務所需的最少的連接埠;
  •  設定你的執行個體時指定源IP地址;僅對HTTP / HTTPS等開放全域訪問;
  •  把敏感性資料和非敏感性資料存放在不同的資料庫中,並且在不同的安全性群組中;
  •  自動化安全的尷尬—不可靠,但有時還得用;
  •  安裝基於主機的入侵偵測系統,如OSSEC;
  •  充分利用系統強化工具,如巴士底獄Linux;
  •  如果你懷疑被駭客入侵,則趕緊備份根檔案系統、快照塊卷,並關閉該執行個體。您可以稍後在一個沒有被入侵的系統上取證研究;
  •  設計一個程式可以給AMI打安全補丁,只需簡單地重啟你的執行個體;
  •  最重要的是:編寫安全的Web應用程式。

(譯自 Twenty Rules for Amazon Cloud Security)

  1. Encrypt all network traffic.

  2. Use only encrypted file systems for block devices and non-root local devices.

  1. Encrypt everything you put in S3 using strong encryption.

  2. Never allow decryption keys to enter the cloud—unless and only for the duration of an actual decryption activity.

  3. Include NO authentication credentials in your AMIs except a key for decrypting the file system key.

  4. Pass in your file system key encrypted at instance start-up.

  5. Do not allow password-based authentication for shell access. Ever.

  6. Do not require passwords for sudo access.

  7. Design your systems so that you do not rely on a particular AMI structure for your application to function.

  8. Regularly pull full backups out of Amazon and store them securely elsewhere.

  9. Run only one service per EC2 instance.

  10. Open only the minimum ports necessary to support the services on an instance.

  11. Specify source addresses when setting up your instance; only allow global access for global services like HTTP/HTTPS.

  12. Segment out sensitive data from non-sensitive data into separate databases in separate security groups when hosting an application with highly sensitive data.

  13. Automate your security embarrassments.

  14. Install a host-based intrusion detection system like OSSEC.

  15. Leverage system hardening tools like Bastille Linux.

  16. If you suspect a compromise, backup the root file system, snapshot your block volumes, and shut down the instance. You can perform forensics on an uncompromised system later.

  17. Design things so you can roll out a security patch to an AMI and simply relaunch your instances.

  18. Above all else, write secure web applications.

亞馬遜雲安全20條規則

相關文章

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.