Search for Well Architected Advice
< All Topics
Print

Keep up-to-date with security threats

To help define and implement appropriate controls, it is essential to stay informed about the latest security threats and attack vectors. By regularly consuming threat intelligence and updates, you can better protect your workload. AWS Managed Services and third-party tools can provide notifications about unusual behavior in your AWS accounts, and using sources like the Common Vulnerabilities and Exposures (CVE) List ensures that your environment is protected against known vulnerabilities.

  1. Stay informed about attack vectors: Regularly monitor security bulletins, reports, and threat intelligence feeds to understand the latest attack methods and trends. Incorporate this knowledge into your threat model and control objectives.
  2. Leverage AWS Managed Services: Use AWS services such as Amazon GuardDuty, AWS Security Hub, and AWS Shield to receive automatic notifications of unexpected or unusual behavior within your AWS accounts. These services help detect anomalies and provide insights into potential security threats.
  3. Integrate third-party tools: Consider using AWS Partner tools or third-party security solutions to enhance your security information flow. These tools can offer real-time updates and automated responses to newly discovered threats.
  4. Monitor the CVE List: Regularly check the Common Vulnerabilities and Exposures (CVE) List to stay informed about publicly disclosed cybersecurity vulnerabilities. Ensure your environment is patched or updated to mitigate any risks identified in the CVE List.
  5. Automate threat updates and responses: Where possible, automate the ingestion of threat information and the application of updates or patches to protect against new vulnerabilities. This can reduce the time between threat identification and mitigation.

Supporting Questions:

  • What sources do you rely on for the latest threat intelligence and updates?
  • How do AWS Managed Services and third-party tools help you detect unusual activity?
  • How frequently do you check and act on updates from the CVE List?
  • What processes are in place to automate responses to new security threats?

Roles and Responsibilities:

Security Engineer:

  • Responsibilities:
    • Stay updated on the latest security threats and apply them to the workload’s threat model.
    • Configure and monitor AWS Managed Services for real-time threat detection.
    • Use third-party tools to integrate additional security insights and threat intelligence.

Cloud Administrator:

  • Responsibilities:
    • Regularly review AWS accounts for notifications of unusual behavior.
    • Ensure that CVE patches are applied in a timely manner.
    • Automate updates and patches where possible to protect against new vulnerabilities.

Artefacts:

  • Threat Intelligence Reports: Documentation of recent security threats and attack vectors relevant to your environment.
  • CVE Monitoring Logs: Records showing how often the CVE List is monitored and which vulnerabilities have been addressed.
  • AWS GuardDuty and Security Hub Alerts: Notifications and logs from AWS services that track unusual or suspicious behavior in your environment.
Table of Contents