You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 20 Next »

In consultation with Cornell IT Security Office and Cornell financial administrators, two "standard" configurations of AWS accounts have been defined, one for general uses and one for research. Each configuration follows AWS, Cornell, and security best practices. Not all best practices can be implemented by policy and configuration. Individual AWS users also need to follow best practices see the Cloudification Services Tech Blog and AWS IAM best practices documentation.

 

AreaConfigurationLink/DescriptionGeneral ConfigurationResearch Configuration
Security/NetworkCornell standard Virtual Private Network configuredSee specifics below. See also the blog article The Cornell “Standard” AWS VPC.yas needed
Security/NetworkAWS VPC connected to on-campus network

Private on-campus subnets are connected to AWS VPC subnets using an AWS Direct Connect connection from campus to AWS. http://docs.aws.amazon.com/directconnect/latest/UserGuide/Welcome.html

Network traffic egress from AWS using the Direct Connect will be billed at a lower rate than egress over the public internet. That rate is the same rate that AWS charges for AWS region-to-region traffic.

yas needed
Security/NetworkAWS VPC subnets are assigned to managed, private IP spacesThis ensures that Cornell private subnets (on-campus and in AWS) do not overlap and that private subnets are transparently and securely routed to AWS VPC subnets.yas needed
Security/Networkprivate AWS VPC subnets are provisioned with a NAT Gateway

This provides a secure route to the public internet so that AWS EC2 instances can retrieve software updates and remain un-exposed to the public internet. (http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/vpc-nat-gateway.html)

yas needed
Security/NetworkAWS VPC are provisioned with AWS Internet GatewaysThis provides AWS EC2 instances running in public VPC subnets access to the internet and vice versa. http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Internet_Gateway.htmlyas needed
Security/NetworkBaseline Network ACL configured for all subnetsThe baseline NACL allows full access between 10-space and Cornell public IPs, but limits access from the world to ports above 1024 and to 22, 80,443.yas needed
     
Security/BusinessAWS account integrated with CloudCheckr

CloudCheckr reports provide suggestions for improving security, reducing costs. It also supports detailed reporting based on AWS labels to e.g., divide account charges to multiple Cornell financial accounts within a single Cornell unit. http://support.cloudcheckr.com/reports/best-practice-report/

yy
     
SecurityAWS CloudTrail enabled for all activity in all regionsCloudTrail logs all AWS API calls in all regions for auditing purposes. (https://aws.amazon.com/documentation/cloudtrail/)yy
SecurityAWS Config enabledConfig rules monitor infrastructure and will alarm if, e.g., CloudTrail becomes disabled for an account. (https://aws.amazon.com/documentation/config/)yy
SecurityAWS Flow Logs configuredAll VPCs are configured to capture flow logs. http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/flow-logs.htmlyy
Securityaccess to AWS account by ITSO in cases of security issues yy
SecurityAWS root account protected with multifactor authenticationroot account should not be used for regular administration and the MFA key should be locked in secure locationyy
Securityno access keys associated with root account yy
Securityuser access controlled by Cornell AD group membership and integrated with Cornell Shibbolethhttp://www.it.cornell.edu/services/shibboleth/; Shibboleth at Cornell Pageyy
Securityaccess for users with administrative privileges utilize Cornell Duo for authenticationIAM users can be used for service/programmatic access. Cornell Duo (aka Two-Step Login): http://www.it.cornell.edu/cms/services/twostep/howto/twostep_login.cfmyy
Securitybaseline IAM password policy configuredThe password policy will enforce complex passwords in the rare instances when an IAM user requires a password.yy
SecurityRO role for AWS resourcesThis role allows the Cloudification Team to view Cornell AWS accounts while troubleshooting and offering assistance, while ensuring that account owners maintain account integrity.yy
     
  • No labels