C S 55D: SECURITY IN AMAZON WEB SERVICES
Foothill College Course Outline of Record
Heading | Value |
---|---|
Effective Term: | Summer 2024 |
Units: | 4.5 |
Hours: | 4 lecture, 2 laboratory per week (72 total per quarter) |
Advisory: | C S 30A, C S 50A, C S 55A and C S 55C. |
Degree & Credit Status: | Degree-Applicable Credit Course |
Foothill GE: | Non-GE |
Transferable: | CSU |
Grade Type: | Letter Grade (Request for Pass/No Pass) |
Repeatability: | Not Repeatable |
Student Learning Outcomes
- A successful student will be able to identify the role the Key Management Service and the best practices used in deployments.
- A successful student will be able to identify important security principles that web services applications must meet when deployed.
- A successful student will be able to describe use of the Shared Responsibility model in secure AWS deployments.
Description
Course Objectives
The student will be able to:
- Apply for an Amazon (AWS) account and Amazon Educate account
- Understand industry security frameworks, such as the CIA triad and AAA security/controls
- Understand compliance and how it differs from security
- Review industry compliance frameworks, such as HIPAA, PCI DSS, ISO 27000, GDPR
- Understand basic security controls (Physical, Technical, Administrative) and control classifications
- Understand the AWS Well-Architected Framework and how the security pillar design principles of that framework apply to the overall security effort, including:
- Identity management
- Detection
- Infrastructure protection
- Data protection
- Incident response
- Understand the AWS controls that AWS uses in practice and how those controls and audits can be used in governance/compliance efforts
- Understand how AWS uses its hypervisor to secure underlying compute instances
- Configure the AWS Identity Access Management (IAM) system
- Use the AWS CloudTrail platform for logging actions within AWS
- Use the AWS CloudWatch platform to collect resources log and act/analyze upon changes
- Use the AWS Config service to monitor changes to asses/audit changes in configurations against internal guidelines
- Automate changes in EC2 compute instances through AWS Systems Manager
- Understand the industry consortiums to monitor and report vulnerabilities
- Understand Inspector and Trusted Advisor services and how those services enable vulnerability inspections
- Review intrusion detection/prevention and learn how AWS implements in AWS GuardDuty
- Review sensitive data discovery with AWS Macie
- Review IPv4 networking and build software defined networks (SDN) within AWS using AWS Virtual Private Cloud (VPC)
- Set up out of region protection and Distributed Denial of Service (DDoS) via AWS Route 53, content distribution networks (AWS CloudFront), and AWS Web Application Firewall (WAF)
- Understand security principles of serverless computing (AWS Lambda), Application Program Gateway (AWS API Gateway), and user authentication/authorization (Amazon Cognito)
- Demonstrate the Key Management Service and AWS Secrets Manager and use best practices to configure
- Review AWS organizational tools for security best practices, such as AWS Organizations, AWS Single Sign On, and AWS Control Tower
Course Content
- AWS access
- AWS account acquisition
- AWS command line interface
- AWS Educate account acquisition
- AAA framework for identity access security, processes for security
- Compliance
- Controls
- Layered security
- AWS security concepts
- AWS Well-Architected Framework
- AWS Well-Architected Security Pillar
- AWS Shared Responsibility Model
- AWS Global Infrastructure
- AWS Nitro Hypervisor principles
- AWS security practices
- AWS Change Management
- Communications and status
- TLS
- Secure logging
- Working under AWS Shared Security Model
- AWS Acceptable Use Policy
- IaaS, PaaS considerations
- AWS Config assessment and auditing
- AWS Systems Manager instance management
- Working with AWS Identity and Access Management (IAM)
- IAM basics
- Users
- Groups
- Roles
- Policies
- Logging and measurement
- CloudTrail event logging and management
- CloudTrail best practices
- Detective
- Preventive
- CloudWatch monitoring
- Metrics collection
- Metrics monitoring
- Event action automation
- Analysis
- Vulnerabilities and mitigations
- Industry efforts
- Common Vulnerabilities and Exposures (CVE) group
- National Institutes of Standards and Technology (NIST)
- Cybersecurity and Infrastructure Agency (CIST)
- Center for Internet Security (CIS)
- AWS Assessment Security tools
- Amazon Inspector scanning service
- Amazon Trusted Advisor
- Industry efforts
- Threat detection, data discovery, monitoring
- Introduction to intrusion detection/prevention
- AWS GuardDuty threat detection
- Introduction to data discovery and sensitive data
- AWS Macie sensitive data discovery
- Security monitoring via AWS Security Hub
- Introduction to intrusion detection/prevention
- Network security
- IPv4 review
- Creating networks within AWS using Amazon Virtual Private Cloud (VPC)
- Design of subnetworks
- VPC Flow Logs
- VPC security best practices
- Out of region protection
- DNS using AWS Route 53
- Content distribution using AWS CloudFront
- Amazon web application firewall (WAF)
- Distributed Denial of Service (DDoS) mitigation using AWS Shield
- Firewall management using VPC, AWS Security Groups, and AWS Firewall Manager
- Cryptography
- Cryptography basics
- Encryption
- Key Management
- Hardware security modules
- AWS Key Management System (KMS) basics
- AWS KMS Security
- AWS Cloud Hardware Security (CloudHSM)
- Applications secrets using AWS Secrets Manager
- AWS account management and provisioning
- AWS Organizations multiple account provisioning
- AWS Single Sign On (SSO)
- Management of multiple AWS accounts with respect to security via AWS Control Tower
Lab Content
- Create AWS working environment including AWS account, AWS Educate Account, and AWS Command line interface on local computer
- Creating AWS Config rules to insure EC2 compute instance managed by AWS Systems Manager
- Creating IAM user accounts with granular permissions
- IAM restrictions demonstration
- Multi factor authentication demonstration using IAM and S3
- CloudTrail and CloudWatch
- CloudTrail trail creation and analysis
- CloudWatch rule and event automation
- CloudWatch monitoring of EC2 instance
- Trusted Advisor demonstration of a PaaS platform and security notifications
- EC2 instance configuration vulnerability discovery via Amazon Inspector
- Amazon Macie sensitive data discovery in S3
- N-tier demonstration of security of IaaS service using VPC
- Content distribution protection using AWS WAF on AWS CloudFront
- REST API demonstration to AWS Serverless Lambda
- Granular storage security methods in AWS S3 using encryption, Access Control Lists (ACLs), private access, network access control via VPCs, and confirmation via AWS Config
- Using KMS secrets to lock S3 objects
- Using Secrets Manager to protect a secret
Special Facilities and/or Equipment
2. A payment method for accessing AWS services (credit/debit/stored value card). AWS as a commercial service requires all accounts to be paid for accounts. AWS will provide credits and no actual spending with normal class use would be incurred.
3. A learning management system with an assignment posting component (through which all lab assignments are to be submitted) and a forum component (where students can discuss course material and receive help from the instructor). This applies to all sections, including on campus (i.e., face-to-face) offerings.
4. The college will provide a fully functional and maintained course management system through which the instructor and students can interact.
5. Students must have email accounts and ongoing access to computers with internet capabilities.
Method(s) of Evaluation
Tests and quizzes
Written laboratory assignments, which include detailed instructions, sample runs, and documentation
Completion of class project implementing and describing real world IaaS threat detection and automation of remediation
Final examination
Method(s) of Instruction
Lectures which include motivation for the architecture of the specific topics being discussed
In-person or online labs (for all sections, including those meeting face-to-face/on campus), consisting of:
1. An assignment webpage located on a college-hosted course management system or other department-approved internet environment. Here, the students will review the specification of each assignment and submit their completed lab work
2. A discussion webpage located on a college-hosted course management system or other department-approved internet environment. Here, students can request assistance from the instructor and interact publicly with other class members
Detailed review of laboratory assignments which includes model solutions and specific comments on the student's submissions
In-person or online discussion which engages students and instructor in an ongoing dialog pertaining to all aspects of designing, implementing, and analyzing programs
When course is taught fully online:
1. Instructor-authored lecture materials, handouts, syllabus, assignments, tests, and other relevant course material will be delivered through a college-hosted course management system or other department-approved internet environment
2. Additional instructional guidelines for this course are listed in the addendum of C S department online practices
Representative Text(s) and Other Materials
All course materials provided by instructor through the online course management system.
Types and/or Examples of Required Reading, Writing, and Outside of Class Assignments
- Reading:
- Reading the supplied handouts and modules averaging 30 pages per week
- Reading online resources as directed by instructor though links pertinent to the course
- Watching video presentations by AWS and other cloud providers as contained in the course
- Reading library and reference material directed by instructor through course handouts
- Writing:
- Writing technical prose documentation that supports and describes the assignments that are submitted for grades