Comprehensive, actionable security guides for every AWS service. Real CLI commands, audit procedures, and expert recommendations.
By Toc Consulting - AWS Security & Cloud Architecture
Comprehensive guide to securing AWS Identity and Access Management. Covers MFA enforcement, least privilege, IAM Identity Center, SCPs, Access Analyzer, and credential management.
Comprehensive guide to securing Amazon S3. Covers Block Public Access, encryption (SSE-KMS, SSE-C deprecation), Object Lock, MFA Delete, VPC endpoints, presigned URLs, and GuardDuty S3 Protection.
Comprehensive guide to securing AWS EC2 instances. Covers IMDSv2 enforcement, security groups, EBS encryption, SSM Session Manager, private subnets, VPC Flow Logs, Amazon Inspector, and AMI hardening.
Comprehensive guide to securing AWS Lambda functions. Covers execution role least privilege, Function URL authentication, VPC placement, code signing, environment variable encryption, Secrets Manager integration, and SnapStart security considerations.
Comprehensive guide to securing Amazon RDS databases. Covers encryption at rest and in transit, private subnet deployment, IAM database authentication, RDS Proxy, audit logging, Secrets Manager rotation, and snapshot security.
Comprehensive guide to securing AWS Key Management Service. Covers key policies, separation of duties, automatic rotation, encryption context, envelope encryption, cross-account access, multi-Region keys, and continuous compliance monitoring.
Comprehensive guide to securing Amazon DynamoDB. Covers CMK encryption, PITR, deletion protection, fine-grained access control, VPC endpoints, CloudTrail data events, resource-based policies, DAX encryption, and global tables security.
Comprehensive guide to securing Amazon Elastic Container Service. Covers task role separation, non-root containers, ECR image scanning, secrets management, GuardDuty runtime monitoring, network isolation, ECScape mitigation, and container image signing.
Comprehensive guide to securing AWS Virtual Private Cloud. Covers Security Groups, NACLs, VPC Flow Logs, VPC Endpoints, Block Public Access, Encryption Controls, Network Firewall, Transit Gateway, and GuardDuty threat detection.
Comprehensive guide to securing AWS CloudTrail. Covers organization trails, KMS encryption, log integrity validation, S3 bucket hardening, CloudWatch integration, data events, Network Activity Events, Insights, SCP anti-tampering, CloudTrail Lake, and continuous audit.
Comprehensive guide to AWS GuardDuty threat detection. Covers Extended Threat Detection, Runtime Monitoring for ECS/EKS/EC2, Malware Protection, S3 and RDS Protection, automated response, multi-account management, and SIEM integration.
Comprehensive guide to securing Amazon Elastic Kubernetes Service. Covers Pod Identity, RBAC least privilege, Pod Security Standards, network policies, secrets encryption, GuardDuty EKS protection, EKS Auto Mode, and CIS EKS Benchmark compliance.
Comprehensive guide to securing web applications with AWS WAF. Covers managed rules, Bot Control, Fraud Control (ATP/ACFP), CAPTCHA/Challenge actions, rate-based rules, Shield Advanced integration, and centralized WAF management with Firewall Manager.
Comprehensive guide to securing AWS Secrets Manager. Covers automatic rotation, custom Lambda rotation, KMS encryption, resource policies, VPC endpoints, multi-region replication, batch retrieval, and continuous compliance.
Comprehensive guide to securing AWS CloudWatch for security monitoring and observability. Covers KMS encryption for log groups, CIS benchmark metric filters, CloudWatch Alarms, Anomaly Detection, cross-account observability, Container Insights, and real-time log processing.
Comprehensive guide to securing Amazon API Gateway. Covers authentication with Cognito and Lambda authorizers, mutual TLS, WAF integration, resource policies, throttling and usage plans, private APIs with VPC endpoints, access logging, SSL/TLS enforcement, and request validation.
Comprehensive guide to AWS Security Hub for centralized security posture management. Covers central configuration, security standards (FSBP, CIS v5.0), automation rules, cross-region aggregation, custom insights, integrations with GuardDuty, Inspector, and Config, and operational best practices for multi-account environments.
Comprehensive guide to securing Amazon Cognito user pools and identity pools. Covers MFA enforcement, advanced threat protection, password policies, WAF integration, JWT verification, Lambda trigger security, and identity pool least privilege.
Comprehensive guide to securing Amazon Elastic Container Registry. Covers image scanning with Inspector, immutable tags, KMS encryption, lifecycle policies, repository policies, VPC endpoints, pull through cache rules, image signing, cross-account access, and Security Hub compliance.
Comprehensive guide to securing Amazon CloudFront distributions. Covers Origin Access Control (OAC), TLS 1.3 enforcement, WAF integration, signed URLs and cookies, response headers policies, geo-restriction, VPC origins, field-level encryption, and Shield Advanced DDoS protection.
Our AWS security experts can audit your infrastructure against these best practices and provide a detailed remediation roadmap tailored to your environment.
Book a Security Audit