Forensic AWS Account
A separate AWS account for forensic investigations is ideal to help you diagnose and isolate the affected resources. By utilizing a separate account, you can architect the environment to be more securely appropriate to its forensic use. You could even use AWS Control Tower to provision the account quickly, using the account vending machine. Once the account has been provisioned, you could use an additional CloudFormation template to set up all the correct S3 buckets and provision any other resources you would need from a configuration standpoint. A process such as this allows you to build the account and environment using a known configuration without relying on manual processes that could be susceptible to errors, which would be undesirable in the early stages of a forensic investigation. This setup can also allow you to spin up the account and take it back down when not in use for extended periods.
While investigating, you should ensure your steps and actions are auditable; this can be done by using logging mechanisms such as CloudTrail and CloudWatch logs. Having your logs all go to a centralized logging account for storage is the best practice. A centralized logging account is a security recommendation listed in the WAF security pillar.
The following section will examine prescriptive IR guidance based on the AWS Security Incident Response Guide.
AWS has taken lessons learned from a number of customer incidents and along with a few other industry-leading resources, such as the NIST SP 800-61 Computer Security Incident Handling Guide, compiled a guide to help with IR. This guide is composed of three major sections:
One of the main aspects addressed in the AWS security pillar whitepaper is containment. When an event requires an IR, you (and your team) must be able to contain the damage. According to the AWS security pillar whitepaper, you should have a containment strategy for any or all of the following reasons:
There are multiple ways to enforce containment in an AWS account, which you will go through now.
Containment can be refined down to three main concepts:
Figure 4.2: Source containment example
Although containment is only one part of the IR process, the steps needed to perform containment for various scenarios should be preconceived before any exploit. This way, each scenario can be mapped to either a manual or an automated containment response.
The following section presents an overview of these areas from the security pillar whitepaper, as questions on the exam can come from knowing how to handle incidents in the manner that AWS prescribes.