選取您的 Cookie 偏好設定

我們使用提供自身網站和服務所需的基本 Cookie 和類似工具。我們使用效能 Cookie 收集匿名統計資料,以便了解客戶如何使用我們的網站並進行改進。基本 Cookie 無法停用,但可以按一下「自訂」或「拒絕」以拒絕效能 Cookie。

如果您同意,AWS 與經核准的第三方也會使用 Cookie 提供實用的網站功能、記住您的偏好設定,並顯示相關內容,包括相關廣告。若要接受或拒絕所有非必要 Cookie,請按一下「接受」或「拒絕」。若要進行更詳細的選擇,請按一下「自訂」。

Contain

焦點模式
Contain - AMS Advanced User Guide
此頁面尚未翻譯為您的語言。 請求翻譯

AMS's approach to containment is partnership with you. You understand your business and the workload impacts that might occur from containment activities, such as network isolation, IAM user or role de-provisioning, instance re-building, and so forth.

An essential part of containment is decision-making. For example, shut down a system, isolate a resource from the network, or turn off access or end sessions. These decisions are easier to make if there are predetermined strategies and procedures to contain the incident. AMS provides the containment strategy and then implements the solution after you have considered the risk involved with implementing the containment actions.

There are different containment options depending on the resources under analysis. AMS expects multiple types of containment to be simultaneously deployed during an incident investigation. Some of these examples include:

  • Apply protection rules to block unauthorized traffic (Security group, NACL, WAF Rules, SCP rules, Deny listing, setting signature action to quarantine or block)

  • Resource Isolation

  • Network Isolation

  • Disabling IAM users, roles and policies

  • Modifying/Reducing IAM user, role privilege

  • Terminating / Suspending / Deleting compute resources

  • Restricting public access from affected resource

  • Rotating access keys, API keys, and passwords

  • Scrubbing disclosed credentials and sensitive information

AMS encourages you to consider the type of containment strategies for each major incident type that is within their risk appetite, with criteria clearly documented to help with decision making in the event of an incident. Criteria to determine the appropriate strategy include:

  • Potential damage to resources

  • Preservation of evidence

  • Service unavailability (for example, network connectivity, services provided to external parties)

  • Time and resources needed to implement the strategy

  • Effectiveness of the strategy (For example, partial containment, full containment)

  • Permanence of the solution (For example, one-way door vs two-way door decisions)

  • Duration of the solution (For example, emergency workaround to be removed in four hours, temporary workaround to be removed in two weeks, permanent solution).

  • Apply security controls that you can turn on to lower the risk and allow time to define and implement a more effective containment.

The speed of containment is critical, AMS advises a staged approach to achieve efficient and effective containment by strategizing short-term and long-term approaches.

Use this guide to consider your containment strategy that involves different techniques based on the resource type.

  • Containment Strategy

    • Can AMS identify the scope of the security incident?

      • If yes, identify all the resources (users, systems, resources).

      • If no, investigate in parallel with executing the next step on identified resources.

    • Can the resource be isolated?

      • If yes, then proceed to isolate the affected resources.

      • If no, then work with system owners and managers to determine further actions necessary to contain the problem.

    • Are all affected resources isolated from non-affected resources?

      • If yes, then continue to the next step.

      • If no, then continue to isolate affected resources until short-term containment is accomplished to prevent the incident from escalating further.

  • System Backup

    • Were backup copies of affected systems created for further analysis?

    • Are the forensic copies encrypted and stored in a secure location?

      • If yes, then continue to the next step.

      • If no, encrypt the forensic images, then store them in a secure location to prevent accidental usage, damage, and tampering.

下一個主題:

Eradicate

上一個主題:

Analyze
隱私權網站條款Cookie 偏好設定
© 2025, Amazon Web Services, Inc.或其附屬公司。保留所有權利。