This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Requirement 6 - Detect anomalous activity
Malware protection
AWS is responsible for the deployment and management of antivirus
and anti-malware solutions on AWS managed services such as Amazon RDS, Amazon ECS, and
AWS Fargate
Software integrity
Software integrity checks are generally embedded in SWIFT software components (AMH, SAA, SAG, SNL). If additional software and components are required to run in the SWIFT secure zone, consider getting a third-party file integrity monitoring tool in the AWS Marketplace.
The immutable infrastructure mentioned in the Security updates section of this document also plays a part in this security control objective. In an immutable infrastructure environment setup, no individuals should be allowed to perform any software changes or modification directly on the live SWIFT system.
Database integrity
Similar to the software integrity requirement, database integrity checks are enabled for SWIFT software components (AMH, SAA, SAG).
From the environment perspective, use a dedicated database instance for SWIFT connectivity purposes. The database should be encrypted with KMS keys. You should have designated users and roles for ensuring separation of duty for the database tables and schemas. Use AWS Secrets Manager to store the password for the database user login, and use the password rotation capability to rotate the database password periodically. You can implement detective controls for password checkout from AWS Secrets Manager.
Regarding database integrity, Amazon RDS creates and saves automated backups of your database (DB) instance during the backup window of your DB instance. Amazon RDS snapshots are automatically encrypted with the same encryption key that was used to encrypt the source Amazon RDS database. For the IAM permission aspect, grant least-privileged IAM policy to authorized roles that are required to perform infrastructure operations on the database instances. For details, refer to Identity-based policy examples for Amazon RDS.
Logging and monitoring
The overall goal is to capture security-related logs, configure alarms for suspicious events, and establish a plan to remediate the incident. Per SWIFT CSP implementation guidelines, enable logging on jump servers, firewall logs, databases, messaging interfaces, and command line history.
GuardDuty can help you detect unauthorized and unexpected activity in your AWS environment. You can use it to analyze and process data from AWS CloudTrail event logs, VPC Flow Logs, and DNS logs to detect anomalies involving the following AWS resource types:
-
EC2 instances
-
S3 buckets
From the application and middleware components perspective, this control objective can be covered by configuring logging and monitoring for different services in the SWIFT secure zone.
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. It also uses integrated threat intelligence such as known malicious IP addresses, anomaly detection, and machine learning (ML) to identify threats more accurately.
Logging in SWIFT secure zone by component:
-
Amazon RDS Oracle — Alert logs, trace log, audit logs, trace files, listener logs, and Oracle Management Agent logs. Refer to Oracle database log files.
-
Amazon MQ — General logging and audit logging. Refer to Configuring ActiveMQ logs.
-
AWS Systems Manager Session Manager — SSM Session Manager Session activity. Refer to Logging session activity.
-
VPC Flow Log — Capture information about the IP traffic going to and from network interfaces in your VPC. Refer to Log and View Network Traffic Flows
. -
AWS CloudTrail — Log account activity-related action across the AWS infrastructure. Refer to Turning on CloudTrail in Additional Accounts.
-
SWIFT Application Logs — AMH, SAA and SAG / SNL logs.
All logging mechanisms have integration with
Amazon CloudWatch Logs, which can be used to store, access, and
monitor the behavior in the SWIFT secure zone. You can leverage
create
metrics from log events using filters to be alerted for
suspicious activities. If you want to perform analytics on the
logs generated, you can use Amazon
CloudWatch Logs Insights
Intrusion detection
Amazon GuardDuty (described in the Logging and monitoring section of this document) can be leveraged to help you meet this control objective. This can not only detect anomalies in the networking traffic that is happening in the VPC, but can also detect suspicious activities on the AWS account level.
AWS Network Firewall