Review Article

Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network

Table 6

Operational security checklist.

AreaInspection itemsRisk levelSecurity guide

IAMIs there a complexity setting for the password for the IAM account that is used to connect to the AWS Console?HighComplexity setting of the password for the IAM account that is used to connect to the AWS Console-
- At least one alphabetic character must be included
At least one number must be included
Must choose at least one character excluding alphanumeric characters-
- Safe when all 3 settings above are enabled
Is there a minimum password length set for the IAM account that is used to connect to the AWS Console?MediumMinimum password length setting for the IAM account that is used to connect to the AWS Console
- Safe when it is set to ‘Password must be at least 8 characters’
Is it possible to allow the users to change their own password for the IAM account that is used to connect to the AWS Console?LowAllow users to change their own password for the IAM account that is used to connect to the AWS Console
- Allowing the users to change their own password
CloudTrailIs the CloudTrail Tracking Creation enabled?HighActivate CloudTrail Tracking Creation
- Performs audits on API Call History by enabling CloudTrail Tracking
- Perform monitoring of abnormal behaviors through a routine inspection of VPC Flow Log
Are integrity checks performed on the CloudTrail logs stored in S3?MediumIntegrity Validation of CloudTrail logs stored in S3
- Log File verification is enabled
- Perform regular reviews of log file integrity
Are periodic audits performed on the CloudTrail logs?HighPeriodic audit of CloudTrail logs
- Monitor unauthorized activities through a periodic (regular) audit of log files
- Conduct user interviews of unauthorized activities
KMSAre the plans for the periodic change of customer management keys (generated by KMS) properly prepared and implemented?HighRegularly change customer management keys generated through KMS
- Manually/automatically performing key changes/management
Is the permission to use KMS-generated keys reviewed on a regular basis?HighRegular review of KMS-generated key permission
- Perform periodic audits of unused accounts and roles through a regular review of key permission