5 tips for securing your AWS Cloud

5 tips for securing your AWS Cloud

AWS security best practices

Despite public Cloud being as popular as ever, questions like, ‘is it more secure than my data center?’ still remain.

In October, Amazon Web Services released a white paper outlining best practices for using its cloud. Sections include how to control costs, enable fault-tolerant infrastructure and get the best performance. Perhaps most importantly, it has advice on how to secure an AWS cloud environment.

Here are five tips from Amazon’s own best security practices.

1. Apply security at all layers

Instead of just having a firewall at the edge of the infrastructure, place virtual firewalls (available in the AWS Marketplace) on each virtual network that is created.

2. Enable traceability, and enforce privilege management

Use tags to indicate which users created and accessed which data when, then use permissions to define which users have access to do what functions. Use the strictest access controls to limit the ability to change root settings, which control the master controls for the environment. Add authorization and multi-factor authentication to the root access controls and any other highly sensitive functions.

3. Monitor and log all actions, changes and points of ingress/egress in your AWS environment

Set up alerts if unusual activity is detected. CloudTrail is AWS’s product to record API call logs, including identifying the time, user who accessed it, and/or source of the IP address.

4. Create custom image templates of virtual servers

Use these images automatically when a new server is launched. Amazon Machine Image (AMI) service will automatically create re-usable templates for any EC2 instances that are spun up, with security setting already pre-installed. The goal should be to create an entire environment that is managed through a template.

5. Encrypt all sensitive data in your AWS environment in transit and in rest

If desired, customers can choose to encrypt data on their own premises then send only encrypted data to the cloud and store the keys to the encryption behind their own on-premises firewall using AWS’s Hardware Security Module.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags cloud computingAmazon Web Servicespublic cloud



Join key decision-makers within Environmental, Social, and Governance (ESG) that have the power to affect real change and drive sustainable practices. SustainTech will bridge the gap between ambition and tangible action, promoting strategies that attendees can use in their day-to-day operations within their business.

EDGE 2023

EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.


ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.

ARN Innovation Awards 2023

Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.

Show Comments