Planning Database Migration to Aurora
Amazon Aurora is a MySQL compatible relational database engine that combines the speed, availability, and security of high end commercial databases...
Security breaches are very common to hear when it comes to technology. Recent news updates like the one for Code Spaces security breach clearly depict how hackers gain access to console of AWS. The account was hacked because they didn’t follow a two-way authentication.
9 things to keep in mind while building a secure AWS environment:
Enable a two factor authentication and change the password of root account. The API keys associated with the root account must be revoked. Also, the data related to account must be secured at a safe location. You can provide an administrator’s account.
Only limited permissions should be granted to users such as erasing screenshots, S3 objects and volumes of data. The reason is that once data is lost here it is not possible to retrieve the data.
The privacy principles should be defined even for the lowest privileges. Policies of IAM must be created. These policies monitor what users can do as well as when and where can they do it.
Many users would be required to be given IAM accounts. However, if they only need consolidated access, do not provide them with API keys. Here, too, a two factor authentication is a must.
Make the passwords more complex and fix the length to at least 12 characters.
Never e-mail or text your credentials. These are too easy to hack.
Keep rotating the API keys to ensure increased safety levels.
Regular auditing helps you protect your environment. Someone should be there to manage your everyday activities going on at cloud.
It is accessible in your region, enable cloud trail. This helps gathering information about who could be hacking your system and hence taking preventive measures.
For any AWS services contact us.
Amazon Aurora is a MySQL compatible relational database engine that combines the speed, availability, and security of high end commercial databases...