AWS Cloud Security: Cheat Sheet

Mar 6, 2025 | Articles

AWS integrates security into the foundation of its cloud infrastructure and provides essential services to help organizations meet their specific security needs.. AWS provides a comprehensive suite of security-related services (AWS SRA) to protect cloud environments from threats, ensure compliance, and strengthen security posture. This cheat sheet will help you quickly understand and implement AWS security services effectively.

Identity and Access Management

AWS Identity and Access Management (IAM)

  • Manage user access and permissions securely.
  • Use IAM roles, policies, and groups to control access.
  • Implement MFA (Multi-Factor Authentication) for extra security.

AWS Single Sign-On (SSO)

  • Centralized user authentication across AWS accounts and apps.
  • Enables integration with Microsoft Active Directory.

AWS Directory Service

  • Managed Microsoft Active Directory, Simple AD, and AD Connector.
  • Allows AWS resources to authenticate against an existing directory.

Network Security

AWS Security Groups & Network ACLs

  • Security Groups: Stateful, instance-level firewalls.
  • Network ACLs: Stateless, subnet-level firewalls.

AWS Web Application Firewall (AWS WAF)

  • Protects web apps from common threats (SQL injection, XSS, etc.).
  • Use managed rules for quick deployment.

AWS Shield

  • DDoS protection for AWS services.
  • Standard (free) and Advanced (paid) tiers.

AWS Firewall Manager

  • Centralized management of WAF, Shield, and security policies.
  • Helps enforce compliance across multiple AWS accounts.

Threat Detection & Monitoring

Amazon GuardDuty

  • AI-driven threat detection for AWS workloads.
  • Detects anomalies, compromised accounts, and malicious activities.

AWS Security Hub

  • Unified security monitoring across AWS services.
  • Aggregates findings from GuardDuty, IAM Access Analyzer, and more.

AWS Detective

  • Investigates and visualizes security issues.
  • Helps analyze logs from AWS CloudTrail, VPC Flow Logs, and GuardDuty.

Amazon Inspector

  • Automates vulnerability assessments.
  • Scans for software vulnerabilities and insecure configurations.

Data Protection & Compliance

AWS Key Management Service (KMS)

  • Secure key management for encryption.
  • Integrates with AWS services to encrypt data at rest and in transit.

AWS Certificate Manager (ACM)

  • Manages SSL/TLS certificates for secure communications.
  • Automates certificate provisioning and renewal.

AWS Macie

  • Uses machine learning to detect sensitive data (PII, financial info, etc.).
  • Helps with compliance requirements like GDPR and HIPAA.

AWS Audit Manager

  • Automates compliance audits.
  • Maps AWS usage data to compliance standards (SOC 2, ISO, NIST, etc.).

Logging & Incident Response

AWS CloudTrail

  • Logs all AWS API activity.
  • Essential for security auditing and forensic investigations.

AWS Config

  • Tracks configuration changes in AWS resources.
  • Enables automated compliance checks.

Amazon CloudWatch Logs

  • Monitors and collects log data from AWS services.
  • Integrates with SIEM tools for security analysis.

AWS Resilience Hub

  • Helps measure and improve application resilience.
  • Simulates security incidents for response testing.

Best Practices for AWS Security

  1. Follow the Principle of Least Privilege (PoLP) – Grant only the necessary permissions.
  2. Enable Multi-Factor Authentication (MFA) – Secure IAM users and roles.
  3. Use AWS Organizations & SCPs – Enforce security policies across accounts.
  4. Implement Encryption Everywhere – Use AWS KMS and ACM for data protection.
  5. Monitor & Respond to Threats – Set up GuardDuty, Security Hub, and CloudTrail alerts.
  6. Regularly Conduct Security Audits – Leverage AWS Audit Manager and Inspector.
Use Case AWS Service Key Features
Identity & Access Management AWS IAM Role-based access control, policy management, MFA support
Single Sign-On (SSO) AWS SSO Centralized authentication across AWS accounts and applications
Active Directory Integration AWS Directory Service Managed Microsoft AD, Simple AD, AD Connector
Firewall & Network Security AWS Security Groups & NACLs Stateful and stateless network-level firewalls
Web Application Protection AWS WAF Protects against SQL injection, XSS, and other web threats
DDoS Protection AWS Shield Standard (free) and Advanced (paid) DDoS protection
Centralized Security Policy Management AWS Firewall Manager Enforces security rules across multiple AWS accounts
Threat Detection & Monitoring Amazon GuardDuty AI-driven threat detection and anomaly detection
Unified Security Monitoring AWS Security Hub Aggregates and prioritizes security findings from multiple services
Security Investigation & Analysis AWS Detective Analyzes CloudTrail logs, VPC Flow Logs, and GuardDuty alerts
Vulnerability Scanning Amazon Inspector Automated assessment of software vulnerabilities and security configurations
Encryption & Key Management AWS Key Management Service (KMS) Secure key storage, encryption for AWS services
SSL/TLS Certificate Management AWS Certificate Manager (ACM) Automates certificate provisioning and renewal
Sensitive Data Detection AWS Macie Machine learning-based detection of PII, financial data
Compliance & Audit Management AWS Audit Manager Automates compliance assessments for SOC 2, ISO, NIST
Activity Logging & API Monitoring AWS CloudTrail Records AWS API calls and user activity for auditing
Configuration & Compliance Tracking AWS Config Tracks and evaluates changes to AWS resources
Log Management & Monitoring Amazon CloudWatch Logs Collects and monitors logs for analysis and alerting
Resilience & Incident Simulation AWS Resilience Hub Assesses application resilience and simulates security incidents

AWS Security Resources & Further Reading

For more details, check out these AWS security resources:

AWS provides powerful security tools, but proactive configuration and continuous monitoring are key to keeping cloud environments secure. Use this cheat sheet as a quick reference to strengthen your AWS security strategy.

Last Updated on March 6, 2025 by Lauryn Colatuno

Cost Optimization

Issue: Small AWS deployment with little management oversight and a lack of cloud skills internal to the organization moving from traditional infrastructure to SaaS and cloud based solutions.

 

What we did

  1. AWS Audit
  2. Cost Optimization Review
  3. Ongoing Monitoring

 

Result:

  • Eliminated unused storage volumes and the old application server no longer in use, the charges for AWS resulted in a savings of 51% per month.
  • We’ll continue to monitor AWS billing and finance to ensure maintenance of savings and identify other future changes.

Cost Optimization

Issue: Small AWS deployment with little management oversight and a lack of cloud skills internal to the organization moving from traditional infrastructure to SaaS and cloud based solutions.

 

What we did

  1. AWS Audit
  2. Cost Optimization Review
  3. Ongoing Monitoring

 

Result:

  • Eliminated unused storage volumes and the old application server no longer in use, the charges for AWS resulted in a savings of 51% per month.
  • We’ll continue to monitor AWS billing and finance to ensure maintenance of savings and identify other future changes.