Security¶
Security in AWS is a shared responsibility. AWS secures the infrastructure; you secure what you build on top of it. These notes cover the core concepts and AWS services for identity, access, encryption, and threat detection.
-
IAM
Identity and Access Management. AWS Organizations, SCPs, permission evaluation order, roles vs users, and identity federation.
-
Cryptography
Symmetric vs asymmetric encryption, SSH key auth, TLS handshake, hashing with salt, KMS envelope encryption, and quantum threats.
-
Security Tools
GuardDuty, Inspector, WAF, Wireshark, nmap, and the attack patterns you're defending against.
The Shared Responsibility Model¶
AWS is responsible for security OF the cloud:
-> Physical data centres (locks, guards, power)
-> Hardware (servers, networking gear)
-> Virtualisation layer (Nitro hypervisor)
-> Global infrastructure (Regions, AZs, Edge)
You are responsible for security IN the cloud:
-> Data (encryption at rest and in transit)
-> IAM (who has access to what)
-> OS patching (on EC2)
-> Network config (VPC, Security Groups, NACLs)
-> Application security (your code, your configs)
It shifts by service:
EC2 (IaaS) -> you own OS, middleware, app security
RDS (PaaS) -> AWS manages OS + engine, you own data + access
Lambda -> AWS manages runtime, you manage code + config
S3 -> AWS manages infra, you manage access policies
Security Mindset¶
Least privilege: Grant only the permissions actually needed
Defence in depth: Multiple layers -- if one fails, others hold
Zero trust: Verify every request, never assume internal = safe
Encrypt everything: At rest and in transit, always
Assume breach: Design systems assuming an attacker is already inside