{"id":65469,"date":"2023-10-18T11:54:08","date_gmt":"2023-10-18T03:54:08","guid":{"rendered":"https:\/\/www.nextlink.cloud\/?post_type=news&#038;p=65469"},"modified":"2024-01-09T18:14:41","modified_gmt":"2024-01-09T10:14:41","slug":"concepts-aws-cloud-security","status":"publish","type":"news","link":"https:\/\/www.nextlink.cloud\/en\/news\/concepts-aws-cloud-security\/","title":{"rendered":"Basic Concepts of Ensuring Data Security in AWS Cloud"},"content":{"rendered":"\n<p>In recent years, AWS has introduced three new services related to data security: AWS Security Data Lake, AWS Clean Rooms, and the functionality of Amazon GuardDuty. However, to this day, most industries, such as finance and healthcare, have yet to fully embrace the cloud due to concerns about the security of data in the cloud and the threat of sensitive information being leaked. In this series, Nextlink will explore the topic of data security in the cloud from three perspectives: &#8216;Securing Data at Rest,&#8217; &#8216;Cryptography &#8211; A New Path in Cybersecurity,&#8217; and &#8216;Building a Secure Environment,&#8217; discussing the data security for businesses using cloud services.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><div class=\"table-responsive\"><table><tbody><tr><td>\ud83d\udca1 Security Basics that Companies Must Know:<br>&#8211; What is Encrypted Transmission? How Does AWS Utilize it to Safeguard Cloud Security?<br>&#8211; How is Data Sensitivity Protected? Security Measures After the Implementation of AWS Data Centers<br>&#8211; New AWS Security Data Lake Service: Identifying Security Vulnerabilities through Data Analysis<\/td><\/tr><\/tbody><\/table><\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is Encrypted Transmission? How Does AWS Utilize it?<\/h2>\n\n\n\n<p>Cryptography and encrypted transmission involve three main concepts: Coded Algorithms, Hash Functions, and Signatures. These concepts are utilized to safeguard data during static or dynamic transmission. Despite the evolution of encryption security and the emergence of various applications such as Hypertext Transfer Protocol Secure (commonly known as HTTPS) and cryptocurrencies, cryptography remains the fundamental tool for ensuring data security. AWS utilizes cryptographic functionalities to provide diverse services for data encryption and storage encryption. For instance, AWS Key Management Service is used to manage keys for all encryption services, while AWS Secrets Manager assists businesses in managing or replacing database credentials and API keys, among other functions.<\/p>\n\n\n\n<p>However, some companies still worry about questions like &#8220;Is there a risk in storing data in the cloud?&#8221; and &#8220;Could sharing hard drives with others through virtual machines lead to confidential leaks?&#8221; According to recent reports, storing data in on-premises environments is actually more susceptible to hacking because security tools for hardware devices are not regularly updated, and there is a lack of real-time alerts and disaster recovery capabilities. In addition to providing reports that comply with cybersecurity regulations of various governments, what practices does AWS have in place to help businesses migrate to the cloud while ensuring data security?<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Sensitive Data Storage: On-Premises vs Cloud?<\/h2>\n\n\n\n<p>Many businesses face considerations about data security sensitivity during their digital transformation. Consequently, they choose to keep their data in on-premises data centers. However, without the assistance of IT maintenance personnel, the security of on-premises data centers can be insufficient, making sensitive data susceptible to leaks. Furthermore, lacking the concept of disaster recovery exposes all data to risks. According to a cybersecurity survey in 2022, issues such as &#8220;insufficient employee awareness of data security,&#8221; &#8220;lack of professional cybersecurity personnel,&#8221; and &#8220;outdated information systems&#8221; ranked among the top risks for business data security. This indicates that even with on-premises services, the risk of data leaks still exists if cybersecurity awareness is not established and security equipment is not upgraded.<\/p>\n\n\n\n<p>In addressing the cybersecurity risks caused by outdated systems, businesses need to prioritize &#8220;cloud migration&#8221; and &#8220;disaster recovery.&#8221; For companies unable to upgrade their systems in the short term but concerned about data leaks in the cloud, they can opt for &#8220;AWS Outposts&#8221; to enjoy the advantages of hybrid cloud. This allows them to store data in on-premises environments while benefiting from the convenience of cloud computing. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"870\" src=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/30495-1-1024x870.jpg\" alt=\"\" class=\"wp-image-62636\" srcset=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/30495-1-1024x870.jpg 1024w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/30495-1-300x255.jpg 300w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/30495-1-768x653.jpg 768w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/30495-1-1536x1306.jpg 1536w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/30495-1-2048x1741.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">In addressing the cybersecurity risks caused by outdated systems, businesses need to prioritize &#8220;cloud migration&#8221; and &#8220;disaster recovery.&#8221;<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">AWS Security Data Lake: Detecting Cybersecurity Vulnerabilities through Data Analysis<\/h2>\n\n\n\n<p>In 2022 AWS re:Invent, one of the new services introduced was &#8220;Amazon Security Data Lake,&#8221; which adopts the Open Cybersecurity Schema Framework (OCSF). It consolidates log records collected from Amazon VPC virtual cloud environments, AWS CloudTrail security trail records, Amazon Route 53 DNS services, and AWS Lambda serverless computing. By leveraging the concepts of OCSF, it optimizes data storage and query capabilities, unifying them within Amazon Security Data Lake. It is seamlessly integrated with Amazon S3 object storage and utilizes data analysis tools, enabling businesses to rapidly analyze and search through historical security data.<\/p>\n\n\n\n<p>By combining the tools of data security and data analysis, businesses can conduct essential analyses on their security data. This enables teams to identify past vulnerabilities in the company&#8217;s cybersecurity, allowing for the strengthening of security measures in those areas. From configuring the foundational infrastructure of data lakes to managing the data lifecycle, Amazon Security Data Lake empowers enterprises to enhance workloads and applications. This results in a crucial impact on protecting data security.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"559\" src=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/security-lake-1024x559.png\" alt=\"\" class=\"wp-image-62631\" srcset=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/security-lake-1024x559.png 1024w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/security-lake-300x164.png 300w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/security-lake-768x419.png 768w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2023\/01\/security-lake.png 1166w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Image Source: AWS Security Data Lake Official Website<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nextlink.cloud\/en\/contact-en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact Us<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, AWS has introduced three new services related to data security: AWS Security Data Lake, AWS Clean Rooms, and the functionality of Amazon GuardDuty. However, to this day, most industries, such as finance and healthcare, have yet to fully embrace the cloud due to concerns about the security of data in the cloud [&hellip;]<\/p>\n","protected":false},"template":"","news_cat":[659],"class_list":["post-65469","news","type-news","status-publish","has-post-thumbnail","hentry","news_cat-cloud"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/news\/65469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":7,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/news\/65469\/revisions"}],"predecessor-version":[{"id":67041,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/news\/65469\/revisions\/67041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/media\/65470"}],"wp:attachment":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/media?parent=65469"}],"wp:term":[{"taxonomy":"news_cat","embeddable":true,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/news_cat?post=65469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}