- A Cloud Guru
Techniques for Securing an Application in AWS
As a newly hired DevOps Engineer, you have been given objectives to strengthen the security posture around a high-profile application. You are given three specific tasks: 1) Move secrets from a CloudFormation template to Secrets Manager and reference them from the template, 2) Configure a web access control list to guard against specific OWASP Top Ten items, and 3) Configure an EC2 instance to be managed by Amazon Inspector.
Table of Contents
Create Secrets in Secrets Manager
- View the CF template to move the username/password to Secrets Manager.
- Create a secret in Secrets Manager named
dbsecret(make sure to get the name exactly right for grading).
Update the CloudFormation Template
Edit the template to reference secrets in Secrets Manager.
Update the template using the reference to Secrets Manager.
Hint: Don't struggle with the syntax on this. Check out this AWS page.
Configure the Web ACL
- From the WAF Console, select Create Web ACL.
- Add the AWS Managed Rules: Core rule set, SQL database rule set, and known bad inputs.
Note: This Web ACL is being created to protect an Application Load Balancer (which we won't create in this lab) in the Northern Virginia Region.
Configure an EC2 Instance to be Managed by Systems Manager
- In IAM, select Create Role.
- Attach the
AmazonSSMManagedInstanceCorepolicy to the role.
- Launch an EC2 Instance with the size t3.micro and the name
instance4ssm1and attach the role.
What's a lab?
Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.