Kernel of Truth

AWS Fundamentals for Cybersecurity Engineers

🔐 AWS Fundamentals for Cybersecurity Engineers

As a cybersecurity engineer, understanding key AWS technologies is critical for securing cloud infrastructure. Below is a curated list of core AWS services, with explanations of what they are, why they matter, and how they’re used in security contexts.


☁️ 1. IAM (Identity and Access Management)

What it is:
AWS’s user, group, and role-based access control system.

Why it’s used:
To define who can access what AWS resources and how. IAM is the first line of defence in cloud security.

Use Cases:

  • Enforcing least privilege
  • Multi-Factor Authentication (MFA)
  • Role assumption (temporary access for EC2, Lambda, etc.)

🔐 2. KMS (Key Management Service)

What it is:
A managed service to create, manage, and rotate encryption keys.

Why it’s used:
To encrypt data at rest and in transit across AWS services using FIPS 140-2 compliant keys.

Use Cases:

  • S3 bucket encryption
  • EBS volume encryption
  • Encrypting secrets in Lambda or RDS

🔍 3. Amazon GuardDuty

What it is:
A threat detection service that uses ML and anomaly detection.

Why it’s used:
To detect malicious activity like crypto mining, port scanning, or unusual API calls.

Use Cases:

  • Alerting on compromised IAM credentials
  • Flagging suspicious EC2 traffic
  • Detecting brute-force login attempts

🧠 4. AWS Security Hub

What it is:
A central dashboard to view and manage security alerts and compliance findings.

Why it’s used:
To aggregate findings from services like GuardDuty, Macie, and Inspector—and map them to CIS, PCI DSS, etc.

Use Cases:

  • Continuous compliance monitoring
  • Unified security posture view
  • Integration with SIEM and SOAR tools

🔐 5. AWS Config

What it is:
A service that tracks resource configurations and changes over time.

Why it’s used:
To monitor configuration drift, support audits, and enforce security baselines.

Use Cases:

  • Alert on open S3 buckets
  • Detect non-compliant security group rules
  • Show history of changes for IR

🔍 6. Amazon Inspector

What it is:
An automated vulnerability assessment tool.

Why it’s used:
To scan EC2 instances, ECR container images, and Lambda functions for CVEs and security issues.

Use Cases:

  • CI/CD vulnerability scanning
  • Risk assessments for EC2 workloads
  • Monitor patching status

🔐 7. AWS WAF (Web Application Firewall)

What it is:
A managed firewall for web applications.

Why it’s used:
To filter traffic at the edge before it reaches apps—based on IP, geo, headers, or payload.

Use Cases:

  • Block SQL injection and XSS
  • Mitigate OWASP Top 10 attacks
  • Protect CloudFront, ALB, API Gateway

🧰 8. AWS Shield & Shield Advanced

What it is:
DDoS protection services at the network and app layers.

Why it’s used:
To provide always-on mitigation against volumetric, state-exhaustion, and app-layer attacks.

Use Cases:

  • Protect public-facing endpoints
  • Real-time incident response with AWS SOC (Shield Advanced)
  • Automated mitigation of DDoS attacks

🔐 9. AWS Secrets Manager

What it is:
A managed service to store and rotate secrets securely.

Why it’s used:
To manage passwords, tokens, and API keys without hardcoding them into apps.

Use Cases:

  • Auto-rotate RDS credentials
  • Secure access tokens for APIs
  • Environment variable management

🔐 10. AWS CloudTrail

What it is:
A service that logs all AWS API calls.

Why it’s used:
For audit trails, forensic analysis, and compliance tracking.

Use Cases:

  • Identify the source of a breach
  • Monitor IAM activity
  • Validate changes during an incident review

🔎 11. Amazon Macie

What it is:
A tool that uses ML to discover and classify sensitive data like PII.

Why it’s used:
To prevent accidental exposure of personal or regulated data in S3 buckets.

Use Cases:

  • Detect PII or credit card data in S3
  • Automate alerts for open buckets with sensitive content
  • Support GDPR or HIPAA audits

☁️ 12. VPC Flow Logs

What it is:
Logs of IP traffic flowing in and out of network interfaces.

Why it’s used:
For network visibility, threat detection, and incident response.

Use Cases:

  • Detect exfiltration attempts
  • Alert on unusual egress patterns
  • Validate firewall rule effectiveness

📦 13. Amazon S3 Bucket Policies & ACLs

What it is:
Access control mechanisms for S3 object storage.

Why it’s used:
To enforce who can read, write, or delete objects—with granular control.

Use Cases:

  • Prevent public access
  • Enable cross-account access with least privilege
  • Log access attempts for sensitive data

🔄 14. AWS Organizations & SCPs

What it is:
A management structure for multiple AWS accounts and Service Control Policies.

Why it’s used:
To centrally govern security controls across accounts.

Use Cases:

  • Block unsupported regions or services
  • Enforce encryption policies org-wide
  • Isolate dev/test/prod with delegated access

🔐 15. Amazon Detective

What it is:
A tool that helps visualise and investigate suspicious activity.

Why it’s used:
To accelerate security incident analysis using graph-based views of CloudTrail, GuardDuty, and VPC logs.

Use Cases:

  • Investigate IAM anomalies
  • Map related resources during an attack
  • Timeline-based forensic analysis

✅ Summary Table

AWS ServiceSecurity PurposeCommon Use Case
IAMIdentity and access controlRole-based policies, MFA
KMSEncryption key managementS3, EBS, RDS encryption
GuardDutyThreat detectionBrute force, crypto mining alerts
Security HubUnified security dashboardCompliance visibility (CIS, PCI, etc.)
AWS ConfigResource compliance trackingAlert on insecure S3 buckets or changes
InspectorVulnerability managementCVE scans for EC2, ECR, Lambda
WAFWeb application protectionBlock OWASP Top 10
Shield / Shield AdvancedDDoS protectionL3/L7 attack mitigation
Secrets ManagerSecure credential storageAuto-rotate DB credentials
CloudTrailAudit log of API activityForensics, IR, compliance logs
MacieSensitive data detectionIdentify PII, alert on exposure
VPC Flow LogsNetwork traffic monitoringAnomaly detection, IR
S3 Bucket PoliciesData access controlBlock public access, enforce encryption
AWS Organizations/SCPsMulti-account governanceEnforce global security rules
DetectiveForensic investigation toolDeep dive into security events