SEC06-BP05 Automate compute protection
Automate compute protection operations to reduce the need for human intervention. Use automated scanning to detect potential issues within your compute resources, and remediate with automated programmatic responses or fleet management operations. Incorporate automation in your CI/CD processes to deploy trustworthy workloads with up-to-date dependencies.
Desired outcome: Automated systems perform all scanning and patching of compute resources. You use automated verification to check that software images and dependencies come from trusted sources, and have not been tampered with. Workloads are automatically checked for up-to-date dependencies, and are signed to establish trustworthiness in AWS compute environments. Automated remediations are initiated when non-compliant resources are detected.
Common anti-patterns:
-
Following the practice of immutable infrastructure, but not having a solution in place for emergency patching or replacement of production systems.
-
Using automation to fix misconfigured resources, but not having a manual override mechanism in place. Situations may arise where you need to adjust the requirements, and you may need to suspend automations until you make these changes.
Benefits of establishing this best practice: Automation can reduce the risk of unauthorized access and use of your compute resources. It helps to prevent misconfigurations from making their way into production environments, and detecting and fixing misconfigurations should they occur. Automation also helps to detect unauthorized access and use of compute resources to reduce your time to respond. This in turn can reduce the overall scope of impact from the issue.
Level of risk exposed if this best practice is not established: Medium
Implementation guidance
You can apply the automations described in the Security Pillar
practices for protecting your compute resources.
SEC06-BP01 Perform vulnerability
management describes how you can use
Amazon Inspector
Automation also plays a role in deploying workloads that are
trustworthy, described in
SEC06-BP02 Provision compute from
hardened images and
SEC06-BP04 Validate software
integrity. You can use services such as
EC2 Image Builder
Beyond these preventative controls, you can use automation in your
detective controls for your compute resources as well. As one
example,
AWS Security Hub
Implementation steps
-
Automate creating secure, compliant and hardened AMIs with EC2 Image Builder. You can produce images that incorporate controls from the Center for Internet Security (CIS) Benchmarks or Security Technical Implementation Guide (STIG) standards from base AWS and APN partner images.
-
Automate configuration management. Enforce and validate secure configurations in your compute resources automatically by using a configuration management service or tool.
-
Automated configuration management using AWS Config
-
Automated security and compliance posture management using AWS Security Hub
-
-
Automate patching or replacing Amazon Elastic Compute Cloud (Amazon EC2) instances. AWS Systems Manager Patch Manager automates the process of patching managed instances with both security-related and other types of updates. You can use Patch Manager to apply patches for both operating systems and applications.
-
Automate scanning of compute resources for common vulnerabilities and exposures (CVEs), and embed security scanning solutions within your build pipeline.
-
Consider Amazon GuardDuty for automatic malware and threat detection to protect compute resources. GuardDuty can also identify potential issues when an AWS Lambda function gets invoked in your AWS environment.
-
Consider AWS Partner solutions. AWS Partners offer industry-leading products that are equivalent, identical to, or integrate with existing controls in your on-premises environments. These products complement the existing AWS services to allow you to deploy a comprehensive security architecture and a more seamless experience across your cloud and on-premises environments.
Resources
Related best practices:
Related documents:
Related videos: