Project Design: Design Solutions To Secure Cloud Services and Applications
Project Design: Design Solutions To Secure Cloud Services and Applications
PROJECT DESIGN •
Table of Contents
1. Introduction....................................................................................................................... 2
2. Executive Summary .......................................................................................................... 2
3. Requirements..................................................................................................................... 3
4. Design Specifications ........................................................................................................ 4
5. Organisational Policies ..................................................................................................... 7
6. Storage Services .. 7
6.1 Amazon Simple Storage Service (Amazon S3)-............................................................................... 7
6.2 Amazon S3 Glacier- ........................................................................................................................... 8
6.3 DynamoDB- ........................................................................................................................................ 9
6.4 Amazon RDS MySQL ..................................................................................................................... 10
6.5 Roles and Functions of AWS Storage Services- ............................................................................ 11
7. Security in AWS .. 12
7.1 CloudTrail ........................................................................................................................................ 12
7.2 Amazon CloudWatch- ..................................................................................................................... 13
7.3 Amazon GuardDuty ........................................................................................................................ 15
7.4 AWS WAF ........................................................................................................................................ 15
7.5 AWS Shield Standard ..................................................................................................................... 15
7.6 Roles and Functions of AWS Security ........................................................................................... 16
8. Network Protection .. 17
8.1 Virtual Private Network (VPC)- .................................................................................................... 17
8.2 Subnets- ............................................................................................................................................ 18
8.3 Security Group- ............................................................................................................................... 19
8.4 Route Tables- ................................................................................................................................... 20
8.5 NAT Gateway- ................................................................................................................................. 21
8.6 NACL- .............................................................................................................................................. 22
8.7 Route Tables (RT)- .......................................................................................................................... 23
8.8 Security Groups- .............................................................................................................................. 25
8.9 Roles and functions of AWS Network Services- ........................................................................... 26
9. Identity and Access Management (IAM) .. 27
9.1 User- .................................................................................................................................................. 27
9.2 Roles- ................................................................................................................................................ 28
9.3 Policy- ............................................................................................................................................... 31
9.4 User Group- ..................................................................................................................................... 32
9.5 MFA-................................................................................................................................................. 32
9.6 Roles and Functions of Amazon IAM services- ............................................................................ 34
10. Service Level Agreements (SLA’s)- ................................................................................ 35
11. Conclusion....................................................................................................................... 36
12. References ....................................................................................................................... 37
P a g e 1 | 39
Project Design Assessment Task 2 42035 Cloud Security
1. Introduction
Stringent regulatory and compliance standards may be particularly difficult in the financial
industry, necessitating financial organisations to become nimbler and utilise dynamic security
capabilities. Financial institutions aim to benefit from the cloud's cost-effectiveness,
scalability, and faster time-to-market for system implementation by overcoming data breaches,
compliance issues, privacy, and data retention and deletion. As financial firms seek to capitalise
on AWS expertise, they will be able to provide their clients with more benefits and capabilities.
In this report, we'll look over some of the AWS capabilities accessible to financial institutions,
as well as how AWS is assisting these businesses in moving to the cloud by utilising its shared
computing and storage services.
2. Executive Summary
With the advancements in technology, protecting the customers’ data and assets has majorly
transformed with access. This report consists of a design specification of a security solution for
a PaaS service model. The functional, non-functional, and regulatory requirements are defined
with respect to the technical specifications. The functional requirements incorporate Amazon’s
security services – MFA, IAM, Intrusion Detection systems. While the non-functional focuses
on Data backup, security audits. Regulatory requirements are defined with respect to the
security solution for a financial organization which includes compliances such as General Data
Protection Regulation, Privacy Act 1988 – ACL.
Further, we have categorised and explained the organisational policies – Authorization and
Management Policy. The detailed implementation process of each component with the roles
and functionalities of the services is elaborated. The Service Level Agreement in AWS
Financial Services compliance and security specialists may also assist clients in developing
scalable, secure cloud platforms that match the organization's security goals, plans, and tactics
while also complying with the most stringent regulatory standards.
P a g e 2 | 39
Project Design Assessment Task 2 42035 Cloud Security
3. Requirements
Req
No Non – functional Requirements
Req 5 The application should use the encrypted medium for communication
P a g e 3 | 39
Project Design Assessment Task 2 42035 Cloud Security
Req 4 Privacy Act 1988 – ACL: Defines rules and requirements for collecting and
managing personal information and protecting the user’s privacy.
Req 5
PCI DSS Level 1: Established to secure the data of cardholders and credit cards.
Req 6 NIST 800 – 177- Provides exhorted requirements to secure the private controlled
unclassified information.
Req 7
EU Data Protection Directive: Regulation approved by the European Union to
secure the privacy and personal data of the citizens.
4. Design Specifications
P a g e 4 | 39
Project Design Assessment Task 2 42035 Cloud Security
For all online financial applications, security is an absolute necessity. Financial application
security is essential for data privacy, customer confidence, and long-term success. The
application design follows the regulations provided by General Data Protection Regulation
(GDPR).
The above Fig1 depicts the financial application architecture, and below are the technical
specifications:
1. Computing Services:
▪ Application is designed to handle the multi-threaded processes to carry out
computational tasks.
▪ AWS Lambda is being used to manage computing resources whenever the
functions are triggered during the API calls in the application.
2. AWS Networking:
▪ The system is designed for multizone availability to achieve high availability
using autoscaling groups which automatically adjusts its capacity to avoid any
server failures.
▪ The Virtual Private Cloud (VPC) is designed with smaller networks as subnets
to optimize network traffic to avoid redundancy and fault tolerance.
▪ Gateway is created as filtering process to avoid risk of theft.
▪ Application is designed to handle the network traffic which consists of inbound
and outbound rules
▪ Security groups have been created to handle inbound and outbound traffic.
▪ Firewall is being used to protect from various web exploits which might affect
the application availability, compromise security.
3. Access controls:
▪ The system should consider the principle of least privilege access control list to
perform identification and authorisation and authentication of users who has
appropriate roles, permissions, and policies to access resources.
▪ An email notification services has been added using AWS SNS to inform
administrator in case of any unauthorised access or during any transaction
failures.
4. Database:
▪ The system is designed to store and process huge amount and complexity of the
data ie., images, audio various other formats.
P a g e 5 | 39
Project Design Assessment Task 2 42035 Cloud Security
▪ The system will allow multiple users to access the data simultaneously and can
handle data loss due to any unusual events.
5. Monitoring:
▪ The system will monitor various risks, compliance, and auditing of user AWS
account and will record the user actions to handle user actions in case of any
inappropriate action.
▪ Threat detection service has been enabled to monitor the malicious activities
and generate security logs for visibility and remediation.
We have divided the design in to four main components which includes security, storage
services, network security and identity and access management.
P a g e 6 | 39
Project Design Assessment Task 2 42035 Cloud Security
5. Organisational Policies
The organizational policies are used in the organisation since we have all the features enabled
and applies extra control to the AWS accounts organisation.
Financial organisations gather massive amounts of data from a variety of sources, including
client financial records, transaction data, and customer support interactions like chatlog
transcriptions. AWS provides storage options for data backup, archival, and recovery
procedures. Amazon's storage services are divided into three categories: object, block, and file
storage.
6.1 Amazon Simple Storage Service (Amazon S3)- It allows businesses to capture and
store vast volumes of unstructured data in a highly reliable, secure, durable, and scalable
manner. S3 interacts with AWS services and stores the data returned by them.
Procedure:
1. On AWS Console→navigate to S3.
2. Choose Create Bucket→provide bucket name.
3. Choose the Region→Create.
P a g e 7 | 39
Project Design Assessment Task 2 42035 Cloud Security
6.2 Amazon S3 Glacier- For data preservation and long-term backup, Amazon S3 Glacier
is a safe, durable, and low-cost Amazon S3 cloud storage class. Financial institutions can
utilise Amazon S3 Object Lock and Amazon S3 Glacier Vault Lock to help them comply
with the SEC's 17a-4(f) technical data storage standards.
Procedure:
1. Navigate to S3 Glacier in the AWS Console→Region to create a vault.
2. Name the vault.
P a g e 8 | 39
Project Design Assessment Task 2 42035 Cloud Security
6.3 DynamoDB- It benefits the users for auto-scaling, backup, and restores options
for all internet-based application. By using API gateway and AWS Lambda the data is
being retrieved from tables stored in DynamoDB.
Procedure:
1. Open DynamoDB console in AWS Console→Create Table.
P a g e 9 | 39
Project Design Assessment Task 2 42035 Cloud Security
6.4 Amazon RDS MySQL- It automates typical database management duties while
providing cost-effective, resizable capacity for an industry-standard relational database.
Financial applications use RDS to save time and money by simplifying administrative
database duties. We will be using the MySQL database engine in our finance application.
Procedure:
1. Navigate to Amazon RDS on AWS Console →choose the region of DB instance.
2. Choose Databases →create database.
P a g e 10 | 39
Project Design Assessment Task 2 42035 Cloud Security
P a g e 11 | 39
Project Design Assessment Task 2 42035 Cloud Security
The exposure of the financial sector to cyber hazards may increase, resulting in operational
interruptions and data breaches. Every financial application is critical to the development of a
cyber-resilient financial sector. Since they mostly deal with payment transactions security plays
a crucial role. We have used the following services to provide security:
7.1 CloudTrail- This is used to keep track of AWS account activities, including actions
performed by the user via the AWS Console. AWS CloudTrail logs API calls made on the
account and sends them to an S3 bucket users designate. Whenever an IAM user makes a
modification in CloudTrail the logs are stored into S3 bucket then CloudWatch detects an
event, which activates an AWS Lambda function, then posts the change event to an SNS
topic, and sends an email alert.
Procedure:
P a g e 12 | 39
Project Design Assessment Task 2 42035 Cloud Security
4. Select the required events for logs→choose the read and write logs under API activity
5. Review→create CloudTrail
7.2 Amazon CloudWatch- Is used to help the users with actionable insights of data for
application monitoring, optimise resource utilisation. It coordinates with SNS to send Email
notifications to the users, Permissions are provided by IAM to CloudWatch to access the
AWS resources i.e., CloudWatch metric data.
P a g e 13 | 39
Project Design Assessment Task 2 42035 Cloud Security
Procedure:
4. Attach CloudWatchAgentServerPolicy
P a g e 14 | 39
Project Design Assessment Task 2 42035 Cloud Security
Procedure:
7.4 AWS WAF- Is used to monitor and block malicious http/s traffic on web applications.
It is used with cloudFront distributions to allow/block web requests.
Procedure:
1. Navigate to WAF in AWS Console→create web ACL
2. Choose CloudFront distributions for the Resource type
3. Add a string match rule→provide the conditions to match the string and AWS
managed rules rule group
4. Set the priority for rules→configure the metrics
5. Complete ACL configuration
7.5 AWS Shield Standard- Is a managed solution that protects applications that run on
AWS from Distributed Denial of Service (DDoS) assaults. AWS Shield Standard is
activated by default for all AWS customers at no extra charge.
P a g e 15 | 39
Project Design Assessment Task 2 42035 Cloud Security
Customers can
AWS CloudTrail manage AWS user's A customer will
account governance
receive a notification
and compliance,
operational in case of
monitoring, and risk
unauthorised access.
auditing.
P a g e 16 | 39
Project Design Assessment Task 2 42035 Cloud Security
8.1 VPC- Is logically alienated from the other virtual networks and provides access over
virtual network, security, connectivity, and resource allocation. Using VPC AWS resources
such as Amazon EC2 instances can be launched; subnets can be created, routing tables and
security groups can be configured and linked, and specific IP address range can be defined.
Procedure:
3. Enter the IPv4 CIDR /16 block address and avoid using IPv6 CIDR block
P a g e 17 | 39
Project Design Assessment Task 2 42035 Cloud Security
8.2 Subnets- It is a specific range of IP address under VPC in a particular availability zone.
Procedure:
P a g e 18 | 39
Project Design Assessment Task 2 42035 Cloud Security
8.3 Security Group- It is a virtual barrier for the incoming and outgoing traffic controlled
by the AWS instance.
Procedure:
3. Select the respective VPC ID→define the inbound and outbound rules.
P a g e 19 | 39
Project Design Assessment Task 2 42035 Cloud Security
8.4 Route Tables- It is a set of rules that directs the network packets to their destination.
Procedure:
P a g e 20 | 39
Project Design Assessment Task 2 42035 Cloud Security
8.5 NAT Gateway- It allows private subnets to access Internet and denies external internet
connection requests.
Procedure:
P a g e 21 | 39
Project Design Assessment Task 2 42035 Cloud Security
8.6 NACL- It is a network level security, that controls traffic according to the set of
inbound and outbound rules.
Procedure:
P a g e 22 | 39
Project Design Assessment Task 2 42035 Cloud Security
1. Main RT
Destination Route
10.0.0.0/16 local
0.0.0.0/0 nat-gateway-id
2. Gateway RT
Destination Route
P a g e 23 | 39
Project Design Assessment Task 2 42035 Cloud Security
0.0.0.0/0 igw-id
3. Custom RT
Destination Route
10.0.0.0/16 local
0.0.0.0/0 igw-id
4. Public subnet RT 1A
Destination Route
10.0.0.0/24 local
0.0.0.0/0 igw-id
5. Public subnet RT 2A
Destination Route
10.0.3.0/24 local
0.0.0.0/0 igw-id
6. Private subnet RT 1A
Destination Route
10.0.1.0/24 local
0.0.0.0/0 nat-gateway-id
P a g e 24 | 39
Project Design Assessment Task 2 42035 Cloud Security
7. Private subnet RT 1B
Destination Route
10.0.2.0/24 local
0.0.0.0/0 nat-gateway-id
8. Private subnet RT 2A
Destination Route
10.0.4.0/24 local
0.0.0.0/0 nat-gateway-id
9. Private subnet RT 2B
Destination Route
10.0.5.0/24 local
0.0.0.0/0 nat-gateway-id
P a g e 25 | 39
Project Design Assessment Task 2 42035 Cloud Security
P a g e 26 | 39
Project Design Assessment Task 2 42035 Cloud Security
IAM delineates and administers the user roles and access rights of a single user in the network
and the situations in which the users are granted or denied of the privileges. IAM permissions
are used by CloudWatch to access AWS resources and check the IAM logs.
9.1 User- It is an entity representing the person/ application that access AWS services.
Procedure:
1. Go to IAM and navigate to User.
2. Select Add user→add a username.
3. Select the AWS credential type – Password.
4. Select the Custom password→set a password.
5. Untick password reset option.
6. Add the user to the desired user group and set no permission boundaries.
P a g e 27 | 39
Project Design Assessment Task 2 42035 Cloud Security
7. Create User.
9.2 Roles- It is an AWS user identity tagged with specific access permissions according to
their roles.
Procedure:
1. Go to IAM and navigate to Roles.
2. Create role→Another AWS account entity.
3. Enter the account ID of the other user→require MFA.
P a g e 28 | 39
Project Design Assessment Task 2 42035 Cloud Security
P a g e 29 | 39
Project Design Assessment Task 2 42035 Cloud Security
P a g e 30 | 39
Project Design Assessment Task 2 42035 Cloud Security
Procedure:
1. Go to IAM and navigate to Policies.
2. Select the policy→Action→Attach.
4. Create Policy.
P a g e 31 | 39
Project Design Assessment Task 2 42035 Cloud Security
9.5 MFA-
Procedure:
1. Go to IAM and navigate to User.
2. Select the user to assign MFA→security credentials tab.
3. Assigned MFA device→Manage→Virtual MFA device.
P a g e 32 | 39
Project Design Assessment Task 2 42035 Cloud Security
P a g e 33 | 39
Project Design Assessment Task 2 42035 Cloud Security
P a g e 34 | 39
Project Design Assessment Task 2 42035 Cloud Security
The aim of defining SLAs is that it sets clear and measurable guidelines and provides recourse
for unmet service obligations which is very crucial for a financial organisation. Following are
the SLA’s used in our application:
Application SLA’s:
Storage SLA’s:
Security SLA’s:
Network SLA’s:
P a g e 35 | 39
Project Design Assessment Task 2 42035 Cloud Security
11. Conclusion
Financial organisations recognise the need for safe, compliant cloud solutions in the highly
competitive and tightly regulated financial industry, where the benefits of the cloud outweigh
the risk of security failures and reputational harm. Firms may use various AWS cloud services
to guarantee that backups are safe, that data is kept in various places to provide adequate backup
and AWS disaster recovery service, and that monitoring, and backup status notifications are
maintained.
While the financial industry has been hesitant to accept new technology in the past, the realities
of the industry now mean that they are beginning to see the numerous advantages that the cloud
can provide. Finally, these businesses have realised that going to the cloud is no longer a
choice-it's a need.
P a g e 36 | 39
Project Design Assessment Task 2 42035 Cloud Security
12. References
1. Amazon Web Services, Inc. 2021. Fast NoSQL Key-Value Database – Amazon
DynamoDB – Amazon Web Services. [online] Available at:
<https://aws.amazon.com/dynamodb/> [Accessed 10 October 2021].
4. Amazon Web Services, Inc. 2021. Install and configure the unified CloudWatch
agent to push metrics and logs from an EC2 instance to CloudWatch. [online]
Available at: <https://aws.amazon.com/premiumsupport/knowledge-
center/cloudwatch-push-metrics-unified-agent/> [Accessed 10 October 2021].
5. Amazon Web Services, Inc. 2021. AWS Identity & Access Management –
Amazon Web Services. [online] Available at: <https://aws.amazon.com/iam/>
[Accessed 10 October 2021].
6. Amazon Web Services, Inc. 2021. IAM - Manage Roles. [online] Available at:
<https://aws.amazon.com/iam/features/manage-roles/> [Accessed 10 October
2021].
P a g e 37 | 39
Project Design Assessment Task 2 42035 Cloud Security
12. Docs.aws.amazon.com. 2021. Getting started with AWS WAF - AWS WAF,
AWS Firewall Manager, and AWS Shield Advanced. [online] Available at:
<https://docs.aws.amazon.com/waf/latest/developerguide/getting-
started.html> [Accessed 10 October 2021].
P a g e 38 | 39
Project Design Assessment Task 2 42035 Cloud Security
<https://docs.aws.amazon.com/AmazonECS/latest/developerguide/create-
public-private-vpc.html> [Accessed 10 October 2021].
17. Docs.aws.amazon.com. 2021. Security groups for your VPC - Amazon Virtual
Private Cloud. [online] Available at:
<https://docs.aws.amazon.com/vpc/latest/userguide/VPC_SecurityGroups.htm
l> [Accessed 10 October 2021].
18. Fugue.co. 2021. Cloud Network Security 101: AWS Security Groups vs NACLs.
[online] Available at: <https://www.fugue.co/blog/cloud-network-security-
101-aws-security-groups-vs-nacls> [Accessed 10 October 2021].
20. N2WS. 2021. The Financial Industry in the AWS Cloud - N2WS. [online]
Available at: <https://n2ws.com/blog/aws-disaster-recovery/financial-industry-
amazon-cloud> [Accessed 10 October 2021].
P a g e 39 | 39