{"id":39510,"date":"2013-07-16T05:01:00","date_gmt":"2013-07-15T23:31:00","guid":{"rendered":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/"},"modified":"2023-03-29T15:58:04","modified_gmt":"2023-03-29T10:28:04","slug":"understanding-security-best-practices-on-aws-cloud","status":"publish","type":"post","link":"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/","title":{"rendered":"Understanding Security Best Practices on AWS Cloud"},"content":{"rendered":" All about Cloud security\n<p><span><span>We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely&nbsp;<\/span><span>\u201cCloud Security\u2019 is no different than&nbsp;<\/span><span>&#8220;On-Premise IT Security&#8221;. There are some differences though and one of the most important security aspect which changes from your &#8220;On-Premise IT&#8221; to &#8220;Cloud&#8221; is that &#8220;the&nbsp;Security on the Cloud is a <strong>Shared Responsibility<\/strong>&#8220;. Hence it becomes imperative for us to understand&nbsp;the responsibilities of both the provider and consumer, &nbsp;eg:&nbsp;<\/span><span>Web application security, SQL injections, phishing etc. are common for on-premise or cloud hosted applications.<\/span><\/span><\/p>\n<div><!--more--><\/div>\n<div>Security components on &#8220;Cloud&#8221; or on &#8220;On-premise&#8221; broadly includes the following three points,<\/div>\n 3 Components of Security\n<div>\n<ol>\n<li>\n<div><strong>Infrastructure Security &#8211;<\/strong>&nbsp;<strong>Provider\u2019s responsibility<\/strong>, one needs to understand how the provider secures its own infrastructure<\/div>\n<\/li>\n<li>\n<div><strong>Application Security &#8211;<\/strong>&nbsp;<strong>Developer\u2019s responsibility<\/strong>, one needs to understand and implement security for an application on Cloud<\/div>\n<\/li>\n<li>\n<div><span><strong>Services Security &#8211;<\/strong>&nbsp;<strong>Developer\u2019s responsibility<\/strong> to use security options provided by the Provider<\/span><\/div>\n<\/li>\n<\/ol>\n<\/div>\n<div><span>Now lets look at the different security layers which one needs to consider while building applications on AWS cloud,<\/span><\/div>\n<ol>\n<li><strong><span><span>Physical Security on AWS &#8211; <\/span><\/span><\/strong><span><span>AWS has a global infrastructure f<\/span><\/span><span>acility with a high level of physical security. This infrastructure is d<\/span><span>istributed in multiple Regions with Availability Zones (AZs). These&nbsp;<\/span><span>AZs are physically separated and are designed as independent failure zones.&nbsp;<\/span><span>Facilities are Controlled and Non-descript, access to which is&nbsp;<\/span><span>need-based with two factor authentication. Developers can leverage this infrastructure to create fault tolerant and self healing applications.<\/span><\/li>\n<li><strong><strong><span>Network Security &#8211; <\/span><\/strong><\/strong><span>AWS network provides significant protection against traditional network security issues and the developers can implement further protection. Some of the network security features which AWS has are <\/span><span><span>Distributed Denial of Service (DDoS) mitigation,&nbsp;<\/span><\/span>\n<div>IP spoofing prohibited.<\/div>\n<div>IP scanning prohibited,<\/div>\n<div>Packet sniffing prevented,<\/div>\n<div>All API endpoints are protected by SSL. Please refer &#8220;<a title=\"AWS: Overview of Security Processes\" href=\"https:\/\/aws.amazon.com\/articles\/1697\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">AWS &#8211; Overview of Security Processes<\/a>&#8221; for further details.<\/div>\n<\/li>\n<li><span><strong>Security for Data <\/strong>&#8211;&nbsp;AWS offers accessibility of data stored on S3 via SSL encrypted endpoints, which helps developers to protect data in transit as well as at rest. AWS also takes certain steps while decommissioning of storage devices to ensure maximum data security, for example storage devices are Degaussed or Physically Destroyed (based on the type of device) before it&#8217;s moved out of any AWS region. So one can be assured that data even on a end of life hardware would not be exposed to unauthorized usage.<\/span><\/li>\n<li><strong><strong><span>Operating System &#8211; &nbsp;<\/span><\/strong><\/strong><span>Multiple levels of security on Amazon EC2 is provided to ensure that data within EC2 cannot be intercepted by non-authorized systems or users.<\/span>\n<ul>\n<li><strong><span>Host operating system<\/span><\/strong>\n<ul>\n<li><span>Individual SSH keyed logins via bastion host for AWS admins<\/span><\/li>\n<li><span>All access logged and audited<\/span><\/li>\n<\/ul>\n<\/li>\n<li><strong><span>Guest operating system<\/span><\/strong>\n<ul>\n<li><span>User controlled at root level<\/span><\/li>\n<li><span>AWS admins cannot log in<\/span><\/li>\n<li><span>User-generated key pairs<\/span><\/li>\n<li>\n<div>Users still need to patch the operating system<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n EC2 Instance Isolation\n<ul>\n<li>\n<div><span>Patching works in the same way as in traditional operating systems<\/span><\/div>\n<\/li>\n<li><strong><strong><strong>EC2 Instance Isolation<\/strong><\/strong><\/strong>\n<ul>\n<li>I<span>nstances on same machine are isolated from each other via Xen Hypervisor<\/span><\/li>\n<li><span>AWS firewall resides at the hypervisor layer<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<ul>\n<li><span>Instance\u2019s neighbors have no more access to that instance than any other host on the Internet<\/span><\/li>\n<li><span>Disk storage is virtualized<\/span><\/li>\n<li><span>Disk virtualization layer automatically resets every block of storage used by the user<\/span><\/li>\n<li>\n<p style=\"display: inline !important;\">One user\u2019s data is never unintentionally exposed to another<\/p>\n<\/li>\n<li>\n<p style=\"display: inline !important;\">Users can encrypt data on virtualized disks<\/p>\n<\/li>\n<\/ul>\n<\/ol>\n<ul>\n<li><span>Maintain OS-level firewalls for additional monitoring and control&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li><span>Keep operating systems and application libraries patched and up-to-date<\/span><\/li>\n<\/ul>\n<ul>\n<li><span>Actively manage your AWS environment to leverage all of the capabilities available<\/span><\/li>\n<li><strong>Security Credential Management &#8211; <\/strong>AWS Indentity and Access Management (IAM) enables users to control and isolate resources. One can isolate resources by Environment (Dev \/ Prod \/ Test etc.), Line of Business, Customer etc. IAM allows to create,\n Identity and Access Management (IAM)\n<ul>\n<li><strong><strong><span>Users &#8211;&nbsp;<\/span><\/strong><\/strong><span><span>Create users and provide permissions to access&nbsp;<\/span><\/span><span>AWS services and resources.&nbsp;<\/span><span>Assign individual security credentials (passwords, access keys and Multi-factor Authentication)<\/span><\/li>\n<li><strong><strong><span>Groups <\/span><\/strong><\/strong><span>&#8211; Are a<\/span><span>&nbsp;collection of IAM users and&nbsp;<\/span><span>can be granted permissions to access AWS services and resources<\/span><\/li>\n<li><strong><strong><span>Roles &#8211;&nbsp;<\/span><\/strong><\/strong><span>Defines a set of permissions for making AWS service requests, it allows&nbsp;<\/span><span>to delegate access, to trusted entities (IAM Users across accounts, services like EC2) without having to share long term access keys<\/span><\/li>\n<li><strong><strong><span>Temporary Security Credentials <\/span><\/strong><\/strong><span>&#8211; is used with&nbsp;<\/span><span>Mobile and browser-based applications,&nbsp;<\/span><span>Consumer applications with unlimited users and&nbsp;Identity Federation to AWS APIs<\/span><\/li>\n<li><strong>Resource-Level Permissions for EC2 and RDS Resources &#8211; <\/strong><a title=\"Resource-Level Permissions for EC2 and RDS Resources\" href=\"https:\/\/aws.typepad.com\/aws\/2013\/07\/resource-permissions-for-ec2-and-rds-resources.html\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">AWS has recently launched this<\/a>, with this one can allow access to limited set of resources within a larger, multi-use EC2 environment.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Logging <\/strong>&#8211;&nbsp;Operate host-based IDS\/IPS (intrusion detection \/ prevention system) and regular auditing and monitoring,<\/li>\n<\/ul>\n<ul>\n<ul>\n<li><span>Extend your current management and logging tools to AWS environment<\/span><\/li>\n<li>\n<div>Install logging tools and log to a separate, central location (e.g.S3)<\/div>\n<\/li>\n<\/ul>\n<\/ul>\n<p><span>Users can explore the following&nbsp;additional&nbsp;options to&nbsp;achieve&nbsp;a high level of security based on their application needs,<\/span><\/p>\n<ol>\n<li><strong>Use Appropriate Security Groups<\/strong> and\n<div style=\"display: inline !important;\"><strong>Audit the state of entire environment using API calls<\/strong> &#8211;&nbsp;Regular calls via command line or API to determine which web-based infrastructure services are being used at any time,&nbsp;Store and compare over time and&nbsp;Track anomalies or non-governed usage<\/div>\n<\/li>\n<li><strong>Virtual Private Cloud (VPC)&nbsp;<\/strong><span>&#8211;&nbsp;lets you provision a logically isolated section of the AWS Cloud, allowing the user complete control over virtual networking environment including selection of your own IP address range, creation of subnets, configuration of route tables and network gateways.<\/span><\/li>\n<li><strong>Regulatory Compliance Requirements <\/strong>&#8211; Users can also use materials and certifications provided by AWS, these security compliance come in handy to build on your own compliance requirement. Ex- PCI DSS compliance might be useful for you if you are working in the area eCommerce.<\/li>\n<\/ol>\n<p>You might also want to read &#8220;<a href=\"https:\/\/blazeclan.com\/asean\/blog\/things-to-know-about-security-on-aws-cloud\/\">6 Things you should know about Security on AWS Cloud<\/a>&#8220;.<\/p>\n<p><strong>References<\/strong><\/p>\n<ol>\n<li><a title=\"Security Best Practices on AWS\" href=\"https:\/\/www.slideshare.net\/AmazonWebServices\/aws-webinar-security-best-practices-on-aws-v02\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">Security Best Practices on AWS<\/a><\/li>\n<li><a title=\"AWS Webinar Series: Security Best Practices on AWS\" href=\"https:\/\/www.youtube.com\/watch?v=Pa1zU7X5y9A\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Webinar Series: Security Best Practices on AWS<\/a><\/li>\n<li><a title=\"AWS Security Center\" href=\"https:\/\/aws.amazon.com\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Security Center<\/a><\/li>\n<\/ol>\n<div class=\"zemanta-pixie\"><a class=\"zemanta-pixie-a\" title=\"Enhanced by Zemanta\" href=\"https:\/\/www.zemanta.com\/?px\"><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely&nbsp;\u201cCloud Security\u2019 is no different than&nbsp;&#8220;On-Premise IT Security&#8221;. There are some differences though and one of the most important security aspect which changes from your &#8220;On-Premise IT&#8221; to &#8220;Cloud&#8221; is that &#8220;the&nbsp;Security on the Cloud is a Shared [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":39495,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1709],"tags":[2163,1849,1426,1163,4645,4646,4647,1497,4648,1057],"class_list":["post-39510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws-cloud-computing-asean","tag-amazon-web-services-asean","tag-aws-asean","tag-cloud-asean","tag-cloud-computing-asean","tag-cloud-computing-security-asean","tag-computer-security-asean","tag-denial-of-service-attack-asean","tag-network-security-asean","tag-physical-security-asean","tag-security-asean"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Security Best Practices on AWS Cloud - Blazeclan<\/title>\n<meta name=\"description\" content=\"We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely \u201cCloud Security\u2019 is no different than \u201cOn-Premise IT Security\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Security Best Practices on AWS Cloud - Blazeclan\" \/>\n<meta property=\"og:description\" content=\"We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely \u201cCloud Security\u2019 is no different than \u201cOn-Premise IT Security\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Blazeclan\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/blazeclan.hq\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-15T23:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-29T10:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1650\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Team Blazeclan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@blazeclan_hq\" \/>\n<meta name=\"twitter:site\" content=\"@blazeclan_hq\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Team Blazeclan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/\"},\"author\":{\"name\":\"Team Blazeclan\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/f235d6bda2f7123cea0ce303dc24d0a5\"},\"headline\":\"Understanding Security Best Practices on AWS Cloud\",\"datePublished\":\"2013-07-15T23:31:00+00:00\",\"dateModified\":\"2023-03-29T10:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/\"},\"wordCount\":1047,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png\",\"keywords\":[\"Amazon Web Services\",\"AWS\",\"Cloud\",\"Cloud Computing\",\"Cloud computing security\",\"Computer security\",\"Denial-of-service attack\",\"Network security\",\"Physical security\",\"Security\"],\"articleSection\":[\"AWS Cloud Computing\"],\"inLanguage\":\"ASEAN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/\",\"url\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/\",\"name\":\"Understanding Security Best Practices on AWS Cloud - Blazeclan\",\"isPartOf\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png\",\"datePublished\":\"2013-07-15T23:31:00+00:00\",\"dateModified\":\"2023-03-29T10:28:04+00:00\",\"description\":\"We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely \u201cCloud Security\u2019 is no different than \u201cOn-Premise IT Security\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#breadcrumb\"},\"inLanguage\":\"ASEAN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage\",\"url\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png\",\"contentUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png\",\"width\":1650,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blazeclan.com\/asean\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Security Best Practices on AWS Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#website\",\"url\":\"https:\/\/blazeclan.com\/asean\/\",\"name\":\"Blazeclan\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blazeclan.com\/asean\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ASEAN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\",\"name\":\"Blazeclan\",\"url\":\"https:\/\/blazeclan.com\/asean\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg\",\"contentUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg\",\"caption\":\"Blazeclan\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/blazeclan.hq\/\",\"https:\/\/x.com\/blazeclan_hq\",\"https:\/\/www.instagram.com\/blazeclantechnologies\/\",\"https:\/\/www.linkedin.com\/company\/blazeclan-technologies\/\",\"https:\/\/www.youtube.com\/channel\/UCCKF4Lcbtus-pUoZr7Lxrow\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/f235d6bda2f7123cea0ce303dc24d0a5\",\"name\":\"Team Blazeclan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf296307abc1182a3462770449cbb6c6db0e45e18d2e60d831842e611d8ed6a6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf296307abc1182a3462770449cbb6c6db0e45e18d2e60d831842e611d8ed6a6?s=96&d=mm&r=g\",\"caption\":\"Team Blazeclan\"},\"sameAs\":[\"https:\/\/blazeclan.com\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Security Best Practices on AWS Cloud - Blazeclan","description":"We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely \u201cCloud Security\u2019 is no different than \u201cOn-Premise IT Security\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Security Best Practices on AWS Cloud - Blazeclan","og_description":"We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely \u201cCloud Security\u2019 is no different than \u201cOn-Premise IT Security\u201d.","og_url":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/","og_site_name":"Blazeclan","article_publisher":"https:\/\/www.facebook.com\/blazeclan.hq\/","article_published_time":"2013-07-15T23:31:00+00:00","article_modified_time":"2023-03-29T10:28:04+00:00","og_image":[{"width":1650,"height":680,"url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png","type":"image\/png"}],"author":"Team Blazeclan","twitter_card":"summary_large_image","twitter_creator":"@blazeclan_hq","twitter_site":"@blazeclan_hq","twitter_misc":{"Written by":"Team Blazeclan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#article","isPartOf":{"@id":"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/"},"author":{"name":"Team Blazeclan","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/f235d6bda2f7123cea0ce303dc24d0a5"},"headline":"Understanding Security Best Practices on AWS Cloud","datePublished":"2013-07-15T23:31:00+00:00","dateModified":"2023-03-29T10:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/"},"wordCount":1047,"commentCount":0,"publisher":{"@id":"https:\/\/blazeclan.com\/asean\/#organization"},"image":{"@id":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png","keywords":["Amazon Web Services","AWS","Cloud","Cloud Computing","Cloud computing security","Computer security","Denial-of-service attack","Network security","Physical security","Security"],"articleSection":["AWS Cloud Computing"],"inLanguage":"ASEAN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blazeclan.com\/asean\/blog\/understanding-security-best-practices-on-aws-cloud\/","url":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/","name":"Understanding Security Best Practices on AWS Cloud - Blazeclan","isPartOf":{"@id":"https:\/\/blazeclan.com\/asean\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage"},"image":{"@id":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png","datePublished":"2013-07-15T23:31:00+00:00","dateModified":"2023-03-29T10:28:04+00:00","description":"We often talk about Security on Cloud as a new and uncharted phenomenon but if we look closely \u201cCloud Security\u2019 is no different than \u201cOn-Premise IT Security\u201d.","breadcrumb":{"@id":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#breadcrumb"},"inLanguage":"ASEAN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#primaryimage","url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png","contentUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2023\/03\/Understanding-Security-Best-Practices-on-AWS-Cloud.png","width":1650,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/blazeclan.com\/blog\/understanding-security-best-practices-on-aws-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blazeclan.com\/asean\/"},{"@type":"ListItem","position":2,"name":"Understanding Security Best Practices on AWS Cloud"}]},{"@type":"WebSite","@id":"https:\/\/blazeclan.com\/asean\/#website","url":"https:\/\/blazeclan.com\/asean\/","name":"Blazeclan","description":"","publisher":{"@id":"https:\/\/blazeclan.com\/asean\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blazeclan.com\/asean\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ASEAN"},{"@type":"Organization","@id":"https:\/\/blazeclan.com\/asean\/#organization","name":"Blazeclan","url":"https:\/\/blazeclan.com\/asean\/","logo":{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/","url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg","contentUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg","caption":"Blazeclan"},"image":{"@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/blazeclan.hq\/","https:\/\/x.com\/blazeclan_hq","https:\/\/www.instagram.com\/blazeclantechnologies\/","https:\/\/www.linkedin.com\/company\/blazeclan-technologies\/","https:\/\/www.youtube.com\/channel\/UCCKF4Lcbtus-pUoZr7Lxrow"]},{"@type":"Person","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/f235d6bda2f7123cea0ce303dc24d0a5","name":"Team Blazeclan","image":{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf296307abc1182a3462770449cbb6c6db0e45e18d2e60d831842e611d8ed6a6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf296307abc1182a3462770449cbb6c6db0e45e18d2e60d831842e611d8ed6a6?s=96&d=mm&r=g","caption":"Team Blazeclan"},"sameAs":["https:\/\/blazeclan.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts\/39510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/comments?post=39510"}],"version-history":[{"count":0,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts\/39510\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/media\/39495"}],"wp:attachment":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/media?parent=39510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/categories?post=39510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/tags?post=39510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}