﻿<?xml version="1.0" encoding="utf-8"?><rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0"><channel><title>News</title><link>https://westchase.bubblelife.com/community/croma_campus_1</link><description>News</description><item><link>https://westchase.bubblelife.com/community/croma_campus_1/library/3554359782/key/352522981/How_Does_AWS_Ensure_Cloud_Security</link><author>Kirtika Sharma</author><title>How Does AWS Ensure Cloud Security?</title><description>&lt;h2 dir="ltr"&gt;&lt;span&gt;Introduction&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;When you deploy systems on Amazon Web Services, you step into a shared responsibility model. You do not hand over all control. You secure what you build. AWS secures the infrastructure. I learned this the hard way during my first cloud migration. I assumed AWS handled everything. However, a misconfigured storage policy had exposed test data. Thats how my approach to cloud security changed. The &lt;/span&gt;&lt;a href="https://www.cromacampus.com/courses/aws-online-training-in-india/"&gt;&lt;span&gt;AWS Online Course&lt;/span&gt;&lt;/a&gt;&lt;span&gt; ensures the right guidance for beginners using state-of-the-art learning facilities.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Shared Responsibility Model&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS splits security into two domains.&lt;/span&gt;&lt;/p&gt;
&lt;div dir="ltr" align="center"&gt;
&lt;table&gt;&lt;colgroup&gt;&lt;col width="132" /&gt;&lt;col width="357" /&gt;&lt;/colgroup&gt;
&lt;thead&gt;
&lt;tr&gt;&lt;th scope="col"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Layer&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th scope="col"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Responsibility&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Cloud Infrastructure&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS handles physical data centers, hardware, networking&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Cloud Usage&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;You handle OS, apps, access control, data encryption&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;You must secure your workloads. AWS secures the foundation.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Key idea:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Security of the cloud belongs to AWS&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Security in the cloud belongs to you&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Identity and Access Management (IAM)&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;IAM controls who can access resources.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;You define:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Users&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Roles&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Policies&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;A policy is a permission rule. It decides what action is allowed.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Important controls:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Least privilege access&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Multi-Factor Authentication (MFA)&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Role-based access&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;I once reviewed a project where admin access was given to all developers. That setup looked simple. It was dangerous. One accidental deletion wiped staging databases.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Data Protection and Encryption&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;AWS protects data in two states:&lt;/b&gt;&lt;/p&gt;
&lt;div dir="ltr" align="center"&gt;
&lt;table&gt;&lt;colgroup&gt;&lt;col width="98" /&gt;&lt;col width="163" /&gt;&lt;/colgroup&gt;
&lt;thead&gt;
&lt;tr&gt;&lt;th scope="col"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Data State&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th scope="col"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Protection Method&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Data at Rest&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Encryption using AES-256&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Data in Transit&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;TLS encryption&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;You use services like:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS Key Management Service for key control&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS CloudHSM for dedicated key storage&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Encryption means converting data into unreadable format. Only the authorized users can perform decryption. Beginners get ample hands-on training opportunities with the &lt;/span&gt;&lt;a href="https://www.cromacampus.com/courses/aws-course-in-pune/"&gt;&lt;span&gt;AWS Course in Pune&lt;/span&gt;&lt;/a&gt;&lt;span&gt; under the guidance of expert mentors.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Network Security Controls&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;With AWS, users get deeper network isolation.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Key tools:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Virtual Private Cloud (VPC) &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Security Groups &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Network Access Control Lists (NACLs) &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;VPC offers a private network for users within the cloud environment.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Security Groups act like firewalls:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Controlling system inbound traffic &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Outbound traffic handling becomes effective &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Professionals get subnet-level filtering with NACLs.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;You can:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Unauthorized Ips get blocked&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Porst get Restricted&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Segments the workloads efficiently&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Attack surface reduces significantly with this structure.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Continuous Monitoring and Threat Detection&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS uses real-time monitoring instead of relying on static security. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Core services:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Amazon CloudWatch helps with logs and metrics tracking&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS CloudTrail is used for API activity recording &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Amazon GuardDuty detects anomalies &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;With Machine learning models, Amazon GuardDuty detects unusual system behaviour instantly.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Example:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Logins from unknown country can be detected &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Unusual API calls send out alerts&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Users get notifications on crypto mining attempts &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;GuardDuty flagged a compromised key instantly. This made detection a lor easier for me.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;One can join &lt;/span&gt;&lt;a href="https://www.cromacampus.com/courses/aws-course-in-mumbai/"&gt;&lt;span&gt;AWS Course in Mumbai&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to learn various industry best practices from expert mentors.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Vulnerability Management and Patch Control&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Automated patching and scanning in AWS reduces risk in systems.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;You use:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Scanning workload improves with Amazon Inspector&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Systems Manager automates patch &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;AWS helps you with the following:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Detecting outdated packages&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Insecure configurations can be detected easily &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Patches get automatically applied&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Manual effort reduces significantly with the above strategies.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Compliance and Governance Frameworks&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS follows global standards for maximum efficiency.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Examples of standards compliant with AWS:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;ISO 27001&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;SOC 2&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;GDPR&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS uses the following tools to follow these standards:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Use AWS Config&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS Control Tower improves efficiency&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;These tools track:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Drifts in configuration &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Cases of policy violations&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;During configuration drifts, system settings change from the expected settings.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Incident Response and Automation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Rapid response improves with AWS.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Key capabilities:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Alerts become automated &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Event-driven remediation procedures &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Accurate Forensic logging &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;You can integrate:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Lambda functions automate responses &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Security Hub offers centralized alerts&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Findings get aggregated inside Security Hub, users get a single dashboard view for better monitoring. This enables users to detect, respond and recover faster.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Zero Trust and Advanced Security Concepts&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;AWS promotes Zero Trust architecture.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;Zero Trust means:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;System does not trust by default&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Every identity gets properly verified&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;b&gt;You enforce:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Stronger authentication&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Continuous validation processes &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Micro-segmentation procedures&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Insider threats and lateral movement reduces significantly with the above methods.&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt;Conclusion&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-c866899e-7fff-e813-83a2-a36a663df4ba"&gt;&lt;span&gt;Security in AWS follows a layered architecture. It ensures strong identity management, encrypts sensitive data, and ensures continuous monitoring of systems. You still carry responsibility for your workloads. That balance defines real cloud security. One can check the &lt;/span&gt;&lt;a href="https://www.cromacampus.com/blogs/aws-certification-cost-in-india/"&gt;&lt;span&gt;AWS Certification Cost&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and join a training course for the best skill development opportunities. When you understand IAM, network isolation, and threat detection, you gain control. Start small. Secure one service at a time. Over time, your architecture becomes resilient. Security stops feeling complex. It becomes a habit.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;img src="https://tampa.bubblelife.com/viewimage/key/3564555124/aws.png?w=512&amp;h=384"&gt;&lt;/p&gt;</description><pubDate>Wed, 20 May 2026 04:26:25 Z</pubDate></item></channel></rss>