SEC08-BP03 Automate data at rest protection
Use automation to validate and enforce data at rest controls. Use automated scanning to detect misconfiguration of your data storage solutions, and perform remediations through automated programmatic response where possible. Incorporate automation in your CI/CD processes to detect data storage misconfigurations before they are deployed to production.
Desired outcome: Automated systems scan and monitor data storage locations for misconfiguration of controls, unauthorized access, and unexpected use. Detection of misconfigured storage locations initiates automated remediations. Automated processes create data backups and store immutable copies outside of the original environment.
Common anti-patterns:
-
Not considering options to enable encryption by default settings, where supported.
-
Not considering security events, in addition to operational events, when formulating an automated backup and recovery strategy.
-
Not enforcing public access settings for storage services.
-
Not monitoring and audit your controls for protecting data at rest.
Benefits of establishing this best practice: Automation helps to prevent the risk of misconfiguring your data storage locations. It helps to prevent misconfigurations from entering your production environments. This best practice also helps with detecting and fixing misconfigurations if they occur.
Level of risk exposed if this best practice is not established: Medium
Implementation guidance
Automation is a theme throughout the practices for protecting your
data at rest.
SEC01-BP06 Automate
deployment of standard security controls describes how you
can capture the configuration of your resources using
infrastructure as code (IaC) templates, such
as
with AWS CloudFormation
You can check the settings that you define in your IaC templates
for misconfiguration in your CI/CD pipelines using rules in AWS CloudFormation Guard. You
can monitor settings that are not yet available in CloudFormation
or other IaC tooling for misconfiguration with
AWS Config
Using automation as part of your permissions management strategy
is also an integral component of automated data protections.
SEC03-BP02
Grant least privilege access and
SEC03-BP04
Reduce permissions continuously describe configuring
least-privilege access policies that are continually monitored by the AWS Identity and Access Management Access Analyzer
Automation also plays a role in detecting when sensitive data is
stored in unauthorized locations.
SEC07-BP03 Automate
identification and classification describes how
Amazon Macie
Follow the practices in REL09 Back up data to develop an automated data backup and recovery strategy. Data backup and recovery is as important for recovering from security events as it is for operational events.
Implementation steps
-
Capture data storage configuration in IaC templates. Use automated checks in your CI/CD pipelines to detect misconfigurations.
-
You can use for AWS CloudFormation
your IaC templates, and AWS CloudFormation Guard for checking templates for misconfiguration. -
Use AWS Config
to run rules in a proactive evaluation mode. Use this setting to check the compliance of a resource as a step in your CI/CD pipeline before creating it.
-
-
Monitor resources for data storage misconfigurations.
-
Set AWS Config
to monitor data storage resources for changes in control configurations and generate alerts to invoke remediation actions when it detects a misconfiguration. -
See SEC04-BP04 Initiate remediation for non-compliant resources for more guidance on automated remediations.
-
-
Monitor and reduce data access permissions continually through automation.
-
IAM Access Analyzer
can run continually to generate alerts when permissions can potentially be reduced.
-
-
Monitor and alert on anomalous data access behaviors.
-
GuardDuty
watches for both known threat signatures and deviations from baseline access behaviors for data storage resources such as EBS volumes, S3 buckets, and RDS databases.
-
-
Monitor and alert on sensitive data being stored in unexpected locations.
-
Use Amazon Macie
to continually scan your S3 buckets for sensitive data.
-
-
Automate secure and encrypted backups of your data.
-
AWS Backup is a managed service that creates encrypted and secure backups of various data sources on AWS. Elastic Disaster Recovery
allows you to copy full server workloads and maintain continuous data protection with a recovery point objective (RPO) measured in seconds. You can configure both services to work together to automate creating data backups and copying them to failover locations. This can help keep your data available when impacted by either operational or security events.
-
Resources
Related best practices:
Related documents:
Related examples:
Related tools: