AWS Cloud 9 Security
AWS Cloud 9 Security
For data protection purposes, we recommend that you protect AWS account credentials and set up individual user accounts with AWS Identity and Access Management (IAM). That way each user is given only the permissions necessary to fulfill their job duties. We also recommend that you secure your data in the following ways:
Use multi-factor authentication (MFA) with each account.
Use SSL/TLS to communicate with AWS resources. We recommend TLS 1.2 or later.
Set up API and user activity logging with AWS CloudTrail.
Use AWS encryption solutions, along with all default security controls within AWS services.
Use advanced managed security services such as Amazon Macie, which assists in discovering and securing personal data that is stored in Amazon S3.
Data encryption refers to protecting data while in transit (as it travels between AWS Cloud9 and your AWS account) and at rest (while it is stored in AWS Cloud9 configuration stores and AWS cloud-compute instances).
In the context of AWS Cloud9, the following types of data may require protection through encryption:
Your content and data
Information that you manipulate, collect, and store. The following are examples of this type of data:
Your code files
Configuration, applications, and data for the attached EC2 environment or SSH environment
Encryption in transit refers to protecting your data from being intercepted while it moves between communication endpoints. All data transmitted between the customer's client and the AWS Cloud9 service is encrypted through HTTPS and encrypted SSH.
HTTPS – Ensures secure requests between the customer's web browser and the AWS Cloud9 service. AWS Cloud9 also loads assets from Amazon CloudFront sent over HTTPS from the customer's browser.
Comments
Post a Comment