For constructing or reviewing AWS accounts that are secure, highly available, and efficient, AWS has developed a framework that incorporates foundational best practices with regard to six pillars—the WAF. The pillars of the WAF consist of the following items:
This framework helps you transition and migrate solutions into the AWS cloud based on best practices and recommendations.
If you are not yet familiar with the AWS WAF, it is suggested that you review its contents.
This chapter will highlight some of the areas of the security pillar whitepaper written for the WAF (https://packt.link/pg1da) that are of specific relevance to IR, both on how you set up your accounts from a preparation standpoint and the stated goals of IR in the whitepaper.
The first part of the WAF security pillar discusses the security foundations that should be part of every account. These are baseline best practices to help an account’s security posture and mitigate the chances of a security incident. If an incident were to occur and these foundations were already put in place, then the essential tools would be there for items such as detection and isolation, which will be discussed later in this chapter.
The seven security foundation principles are as follows:
Not all of these foundational principles apply to the concept of IR. However, they do apply to the concepts of securing your AWS account and looking and parsing through the questions of the Security Specialty Certification. Knowing these foundational guidelines and when they are or are not being applied in the exam questions can help you decipher some of the answers on the exam.
Out of the seven security foundations we defined, the following three are the most important for IR: enable traceability, automate security best practices, and prepare for security events.
Now that you have examined the security foundations of the WAF, you can dive deeper into how you can prepare for security events by creating a forensic AWS account.