fbpx

Utilize updates to return from security breaches

The AWS Customer Incident Response Team ( CIRT ) extends its warmest greetings! Supporting clients during active protection events on the business section of the AWS Shared Responsibility Model is a focus of WKS CIRT.

 <p>Over the past three years, AWS CIRT has supported customers with security events in their AWS accounts. These include the unauthorized use of <a href="https://aws.amazon.com/iam/" target="_blank" rel="noopener">AWS Identity and Access Management (IAM)</a> credentials, ransomware, and data deletion in an AWS account.</p> <p>In this post, I will walk you through key AWS services and features that provide backup and recovery solutions to restore your data based upon the lessons our team has learned when supporting customers experiencing security events.</p> <h2>Shared Responsibility Model</h2> <p>Security is a<a href="https://aws.amazon.com/compliance/shared-responsibility-model/" target="_blank" rel="noopener"> shared responsibility</a> between AWS and the customer. Customers are responsible for protecting their data IN the cloud. For <a href="https://aws.amazon.com/pm/ec2/" target="_blank" rel="noopener">Amazon Elastic Compute Cloud (Amazon EC2)</a>, this includes the guest operating system, installed applications, and data stored within the instance and associated <a href="https://aws.amazon.com/ebs/" target="_blank" rel="noopener">Amazon Elastic Block Store (Amazon EBS)</a> volumes. For <a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener">Amazon Simple Storage Service (Amazon S3)</a> and <a href="https://aws.amazon.com/dynamodb/" target="_blank" rel="noopener">Amazon DynamoDB</a>, AWS operates the infrastructure layer, the operating system, and service resources, and customers access the endpoints to store and retrieve data.</p> <p>Backup and recovery configuration are a part of the customer’s side of the shared responsibility model. AWS doesn’t have the ability to recover a deleted resource. It doesn’t matter how quickly the event is reported to AWS. The inability to recover resources includes actions by the AWS account root user or an IAM principal in the account.</p> <p>Customers are also responsible for managing their data (including encryption options), classifying their assets, and using IAM tools to apply the appropriate permissions. AWS strives to make it simple for customers to back up and restore their data. We recommend that you compare the risk and costs associated with losing data to the available solutions to make the best decision for your data and business use cases.</p> <h2>Why do you need backups?</h2> <p>The National Institute of Technology (NIST) <a href="https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final" target="_blank" rel="noopener">Computer Security Incident Handling Guide SP 800-61 Rev. 2</a> defines a computer security incident as “a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.” AWS recently updated the <a href="https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/document-revisions.html" target="_blank" rel="noopener">AWS Security Incident Response Guide</a> as a resource to help customers throughout the incident response life cycle.</p> <p>Backup and restore processes help you restore data to a point in time before unauthorized actions. Unauthorized actions can be accidental or part of a security event. Implementing backup and restore processes can help you reduce costs by limiting the number of resources that need backups, associated storage, and overall timelines associated with <a href="https://docs.aws.amazon.com/whitepapers/latest/disaster-recovery-workloads-on-aws/business-continuity-plan-bcp.html" target="_blank" rel="noopener">acceptable Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs)</a>. For additional guidance on backup solutions and programs, see <a href="https://aws.amazon.com/blogs/security/top-10-security-best-practices-for-securing-backups-in-aws/" target="_blank" rel="noopener">Top 10 security best practices for securing backups in AWS</a></p> <h2>How does AWS help?</h2> <p>AWS provides several solutions for backups to integrate with your operational and security incident recovery procedures which I describe in more detail in this section. For additional information, see <a href="https://aws.amazon.com/backup-restore/" target="_blank" rel="noopener">AWS Backup &amp; Restore</a>.</p> <h3>Amazon EC2</h3> <p><a href="https://aws.amazon.com/ec2/" target="_blank" rel="noopener">Amazon EC2</a> provides scalable computing capacity in the AWS Cloud. Using Amazon EC2 can help eliminate your need to invest in hardware up front, helping you to develop and deploy applications faster.</p> <ul> <li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-volumes.html" target="_blank" rel="noopener">EBS volumes</a> are the primary persistent storage option for Amazon EC2. Use this block storage for structured data, such as databases, or unstructured data, such as files in a file system on a volume. An EBS snapshot takes a copy of the EBS volume and places it in Amazon S3, where it is stored redundantly in multiple Availability Zones.</li> <li>Restore an entire EC2 instance including its associated volumes by <a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/backup-recovery/restore.html" target="_blank" rel="noopener">restoring an Amazon Machine Image (AMI) backup</a> of your instance. Create AMIs for known good configurations, and integrate them with auto scaling groups to support the scaling and resiliency of your services. For more information on snapshots and AMIs, see <a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/backup-recovery/backup-recovery-ec2-ebs.html" target="_blank" rel="noopener">Backup and recovery for Amazon EC2 with EBS volumes.</a></li> <li>Create a <a href="https://aws.amazon.com/blogs/awsmarketplace/announcing-the-golden-ami-pipeline/" target="_blank" rel="noopener"><em>golden image</em></a> by preloading needed software and configuration on an EC2 instance, and then creating an image of that. Then, use the resulting image to launch new instances, with updates needed only for the period after image creation.</li> <li><a href="https://docs.aws.amazon.com/fsx/latest/WindowsGuide/what-is.html" target="_blank" rel="noopener">Amazon FSx for Windows File Server</a> provides fully-managed Microsoft Windows file servers, backed by a fully native Windows file system. To help ensure file system consistency, Amazon FSx uses the Volume Shadow Copy Service (VSS) in Microsoft Windows. Each FSx for Windows File Server backup contains the information that is needed to create a new file system from the backup, effectively restoring a point-in-time snapshot of the file system. For more information, see <a href="https://docs.aws.amazon.com/fsx/latest/WindowsGuide/using-backups.html" target="_blank" rel="noopener">Amazon FSx: Working with backups</a>.</li> <li><a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/recycle-bin.html" target="_blank" rel="noopener">Amazon EC2 Recycle Bin</a> is a data recovery feature that enables you to restore Amazon EBS snapshots and EBS-backed AMIs that were accidentally deleted. If your resources are deleted, they are retained in the Recycle Bin for a period that you specify, before they are permanently deleted.</li> </ul> <h3>Transactional databases</h3> <p>In cloud computing, the ideal scenario is to keep persistent transactional states in databases so that those resources are the only things that actively require backups. When used in conjunction with AWS compute services, this minimizes the volume of data that you need to back up. Everything else is restored from a golden image or equivalent through auto scaling or a continuous integration and continuous delivery (CI/CD) pipeline. To estimate costs associated with service usage and the use of backup storage, use the <a href="https://calculator.aws/#/" target="_blank" rel="noopener">AWS Pricing Calculator</a>. Work backwards from your critical data that requires backups to help limit costs associated with your overall backup solution.</p> <ul> <li><a href="https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Aurora.Managing.Backups.html" target="_blank" rel="noopener">Amazon Aurora backups</a> are continuous and incremental so that you can quickly restore to any point within the backup retention period. You can specify a backup retention period of 1 to 35 days when you create or modify a database cluster. Aurora backups are stored in Amazon S3.</li> <li><a href="https://aws.amazon.com/dynamodb/" target="_blank" rel="noopener">Amazon DynamoDB</a> allows you to back up your table data continuously by using point-in-time recovery (PITR). When you use PITR, DynamoDB backs up your table data automatically with per-second granularity to restore to any second in the preceding 35 days. For more information, see <a href="https://aws.amazon.com/dynamodb/pitr/" target="_blank" rel="noopener">DynamoDB PITR</a>.</li> <li><a href="https://docs.aws.amazon.com/neptune/latest/userguide/backup-restore-overview.html" target="_blank" rel="noopener">Amazon Neptune</a> is a fast, reliable, fully managed graph database service. The core of Neptune is a purpose-built, high-performance graph database engine. Neptune backups are continuous and incremental so that you can quickly restore to any point within the backup retention period. You can specify a backup retention period, from 1 to 35 days, when you create or modify a DB cluster.</li> <li><a href="https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithAutomatedBackups.html" target="_blank" rel="noopener">Amazon Relational Database Service (Amazon RDS)</a> creates and saves automated backups of your DB instance during the backup window of your DB instance. Amazon RDS creates a storage volume snapshot of your DB instance, backing up the entire DB instance and not just individual databases. Amazon RDS saves the automated backups of your DB instance according to the backup retention period that you specify between 0 and 35 days. If necessary, you can recover your database to any point in time during the backup retention period.</li> </ul> <h3>Amazon Elastic File System</h3> <p><a href="https://aws.amazon.com/efs/" target="_blank" rel="noopener">Amazon Elastic File System (Amazon EFS)</a> provides serverless, fully elastic file storage to help you share file data without provisioning or managing storage capacity and performance. The service manages the file storage infrastructure for you to avoid the complexity of deploying, patching, and maintaining complex file system configurations.</p> <p>The <a href="https://aws.amazon.com/solutions/implementations/efs-to-efs-backup-solution/" target="_blank" rel="noopener">EFS-to-EFS Backup solution</a> is suitable for Amazon EFS file systems in each AWS Region. It includes an <a href="https://aws.amazon.com/cloudformation/" target="_blank" rel="noopener">AWS CloudFormation</a> template that launches, configures, and runs the AWS services required to deploy the solution. This solution follows AWS best practices for security and availability.</p> <h3>Amazon S3</h3> <p><a href="https://aws.amazon.com/pm/serv-s3" target="_blank" rel="noopener">Amazon S3</a> is an object storage service that offers industry-leading scalability, data availability, security, and performance designed for 99.999999999% (11 9’s) of durability. When using Amazon S3, you should configure the security of the S3 buckets and objects that are part of your backup solution. For more information on security best practices for Amazon S3, see <a href="https://aws.amazon.com/blogs/security/top-10-security-best-practices-for-securing-data-in-amazon-s3/" target="_blank" rel="noopener">Top 10 security best practices for securing data in Amazon S3</a> and <a href="https://aws.amazon.com/blogs/security/anatomy-of-a-ransomware-event-targeting-data-in-amazon-s3/" target="_blank" rel="noopener">The anatomy of ransomware event targeting data residing in Amazon S3</a>.</p> <h3>AWS Backup: A comprehensive solution</h3> <p>If you need a backup strategy for multiple services or to manage backups from a single solution, consider using <a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/backup-recovery/aws-backup.html" target="_blank" rel="noopener">AWS Backup</a>. AWS Backup is a fully-managed service that makes it simple to centralize and automate data protection across AWS services in the cloud, and on premises. For a list of supported services and resource feature availability, see the <a href="https://docs.aws.amazon.com/aws-backup/latest/devguide/whatisbackup.html" target="_blank" rel="noopener">AWS Backup Developer Guide</a>.</p> <p>AWS Backup provides for centralized, policy-based data protection. Your backup data is encrypted using encryption keys managed by <a href="https://aws.amazon.com/kms/" target="_blank" rel="noopener">AWS Key Management Service (KMS)</a>, reducing your need to build and maintain a key management infrastructure. With AWS Backup, you can do the following:</p> <ul> <li>Set backup retention policies that automatically retain and expire backups, minimizing backup storage costs.</li> <li>Copy backups across different AWS Regions and accounts from a central console to help you meet your compliance and disaster recovery needs.</li> <li>Create data protection policies and use AWS Organizations to enforce the protection policies throughout the accounts in that organization.</li> <li>Set resource-based access policies on backup vaults. Use resource-based access policies to control access to backups in a backup vault across users, rather than having to define permissions for each user.</li> </ul> <p>AWS Backup can help you align with your data protection needs with real-time analytics and insights, as follows:</p> <ul> <li>You can audit and report on the compliance of your data protection policies to help meet your business and regulatory needs with <a href="https://aws.amazon.com/about-aws/whats-new/2021/08/aws-backup-audit-manager/" target="_blank" rel="noopener">AWS Backup Audit Manager</a>.</li> <li>AWS Backup supports legal hold, which is used when an organization must retain certain data either for preservation, auditing, or as evidence in legal proceedings and e-Discovery.</li> <li>You can choose your controls. For information on the available controls, their customizable parameters, and their AWS Config recording resource types, see <a href="https://docs.aws.amazon.com/aws-backup/latest/devguide/choosing-controls.html" target="_blank" rel="noopener">Choosing your controls</a>. Every control requires the recording resource type <span>AWS Config: resource compliance</span> because this type records your compliance status with either the AWS Backup Framework or a custom framework that you define.</li> </ul> <h2>How much will this cost?</h2> <p>To estimate costs for individual services and features, use the <a href="https://calculator.aws/#/" target="_blank" rel="noopener">AWS Pricing Calculator</a>. For additional cost information, see the feature page for each service at <a href="https://aws.amazon.com/products/" target="_blank" rel="noopener">AWS Cloud Products</a>.</p> <h2>Conclusion</h2> <p>In this blog post, you learned about several AWS services and features to help you back up and restore your data. By analyzing and configuring backup and restore capabilities, you can enable resilience from an accidental deletion or security event.</p> <!-- '"` -->