What is zero trust
Trust nobody. Even if the component is within the same network. Every user, system/component has to identity itself for a successful communication (such as accessing data or invoking an API) with other components in the system.
Why is it required
Zero trust approach greatly reduces attack surface area as they remove unneeded pathways to your data.
How to setup zero trust in AWS
-
1. Identity and Access Management (IAM)
- Use IAM roles instead of long-lived credentials (no access keys in code).
- Enable IAM Access Analyzer to identify unused permissions.
- Enforce MFA for all.
- Use attribute-based access control (ABAC) for granular permissions.
-
2. Use SSO, IAM Identity Center
- Integrate with AWS IAM Identity Center (Successor to AWS SSO) for centralized authentication.
- Use SAML or OIDC federation for employee identity providers.
- Require MFA across all privileged access.
- Use attribute-based access control (ABAC) for granular permissions.
-
3. Network Segmentation (No Implicit Trust)
- Use VPCs, Subnets, and Security Groups to isolate workloads.
- Deploy Private-Link or VPC endpoints to access AWS services privately
- Minimize or eliminate public access to workloads.
- Use Network Access Control Lists (NACLs) and security groups to enforce segmentation.
-
4. Continuous Monitoring & Logging
- Enable CloudTrail for full audit logging.
- Use Amazon GuardDuty for threat detection.
- Monitor logs using AWS CloudWatch Logs and AWS Security Hub.
- Set up alerts for unusual activity using AWS Config and CloudWatch Alarms.
-
5. Device and Workload Verification
- Implement Amazon Inspector to scan for vulnerabilities.
- Use Systems Manager for secure management of EC2 instances.
- Tag workloads and enforce policies using service control policies (SCPs) in AWS Organizations.
-
6. Device and Workload Verification
- Encrypt data at rest using KMS and in transit using TLS.
- Use Macie for discovering and protecting PII data in S3.
- Enable bucket policies and S3 Block Public Access.
If you need help with Zero trust approach and setup for your software solution, DeepDefence can help you. Drop us a message now!! We offer a free security assessment to new customers.