Securing public cloud infrastructure is now a top priority for every organization that leverages cloud services to host their application or data. Remember that while the cloud provider is responsible for keeping their infrastructure secure, ensuring your data—including everything you keep in Amazon S3 storage—is up to you.
In this blog, we’ll look at how organizations that use Amazon S3 can avoid cloud security challenges, protect their data, and take advantage of NetApp cloud solutions for an added layer of protection.
Managed storage services such as Amazon S3 are where the customer is responsible for managing Amazon S3 resources and the data they upload and store on it. According to the shared responsibility model, AWS manages the network, physical security, OS patching and availability of their service, while the user is responsible for ensuring proper access to the Amazon S3 bucket and objects. Making a mistake on that level means putting your data at risk.
The following checklist will help you learn the best practices and tasks to protect Amazon S3 configurations.
It’s important in cloud security considerations to restrict access to your Amazon S3 resources to make sure no one who isn’t authorized ever gets to see that data. In order to restrict access to Amazon S3 resources you can use IAM policies, bucket policies, and NACLs. Here is how to do each of those things:
A good way to understand how to strengthen security settings is by logging actions performed on Amazon S3 configurations, buckets, and objects. Services such as AWS CloudTrail and Amazon S3 server access logging can help you monitor AWS.
Don’t store all your data in single bucket: As a best practice, never store all your data in a single bucket, as any mishap can lead to all that data being compromised. Instead, use separate buckets, which limits access. If you have data in one bucket that depends on data in another bucket, use Cross-origin resource sharing (CORS) to grant access between bucket files across domains.
Avoid getting locked out! There are 3 types services that SSE S3 offers:
1) SSE-S3 is Server-Side Encryption with Amazon S3-managed encryption keys, which provides a strong multi-factor encryption standard for Amazon S3 objects that not only encrypts objects but safeguards them by encrypting the key itself with a master key that it regularly rotates.
2) SSE-KMS is Amazon Key Management Service (KMS) is a scalable cloud-based key management system that makes it easy to manage and rotate keys using IAM policies and rotation policies.
3) And SSE-C is server-side encryption using customer-provided keys to helps encrypt data without sharing management of your key with AWS.
Don’t use naked-source URLs in websites and web applications: This is something which most of development and security teams miss. A hacker can potentially get the source URL of a bucket just by scanning the website to reveal the source URL of content stored on your Amazon S3 bucket. One should always customize Amazon S3 URLs with CNAMEs to avoid such risks.
As security is a shared responsibility, enterprises will want to use tools in addition to those provided by AWS to help reduce the manual dependency on security configurations and protect their data on Amazon S3. NetApp understands the risks of running in the public cloud, and has various tools that help maintain optimum security without having to compromise on your security.
Cloud Sync is also a handy way to create a secondary copy of your data on Amazon S3 for archiving, analytics, testing, and more.
Since backup is always a necessary way to protect your data, it is important to find a way to store those backups efficiently or else costs will add up. For that, Cloud Volumes ONTAP (formerly ONTAP Cloud) provides powerful storage efficiencies, such as data tiering, thin provisioning, deduplication, compaction, and compression, all of which can work together to significantly cut the amount of storage needed for backup copies. Working with Cloud Volumes ONTAP, your data is protected by NetApp’s Role-based Access Control (RBAC) and NetApp Storage Encryption (NSE).
Data or files stored in cloud storage need to be protected and constantly monitored. Given that despite the best security efforts cloud security breaches still take place, customers using public cloud platforms need to be diligent about data security in cloud computing and protecting Amazon S3 configurations.
Customers should use the security configurations outlined above within Amazon S3 and leverage additional tools such as Cloud Volumes ONTAP and Cloud Sync.