Commentary

What is AWS Security? An explanation of the basic concepts and rules for secure use.

Eye-catching image
table of contents

AWS is often described as a "highly secure cloud," but incidents due to misconfigurations and operational deficiencies still occur. This is not because AWS's infrastructure is weak, but primarily because the premise of "what AWS protects and what users are responsible for protecting" is not properly understood.

AWS security isn't simply about knowing the services and configuration items. It only functions effectively when the scope of management and operational rules are clearly defined based on a shared responsibility model.

This article will cover everything from the fundamental concepts of AWS security, the shared responsibility model, basic rules for secure use, and the essential ideas you should grasp first.

What is AWS security?

Understanding AWS security isn't about memorizing specific measures or service names. First, you need to clarify what "security" means in the context of AWS, how it differs from on-premises systems, and why AWS is considered secure.

The meaning of "security" in AWS

In AWS, security is not simply about preventing unauthorized access or creating mechanisms to withstand attacks. It's a concept that encompasses not only the security of the foundational layers such as infrastructure, networks, and hardware, but also the assumptions and considerations under which the systems running on top of them are designed and operated.

AWS provides services such as physical protection of data centers, infrastructure redundancy, and encryption of communications. On the other hand, decisions regarding who can perform which operations, how much information is exposed to the outside, and how anomalies are detected are left to the user.

In other words, AWS security is based on a combination of "prepared mechanisms" and "user judgment."

Security assumptions differ between on-premises and AWS.

In on-premises environments, since servers and network equipment are owned and managed by the company, security measures have traditionally been based on the premise that "we are responsible for protecting everything ourselves." From physical access control to network configuration and OS and middleware updates, the lines of responsibility are relatively clear.

On the other hand, with AWS, much of the infrastructure is provided as a service. As a result, the approach to security shifts from "protecting everything ourselves" to "dividing the scope of what needs to be protected."

If you treat AWS the same way you would an on-premises system, without understanding what to entrust to AWS and what to manage yourself, you may end up with excessive security measures or, conversely, overlooking crucial aspects.

To use AWS safely, it's essential to understand this difference in underlying assumptions before even considering the technology itself.

Why is AWS considered "safe"?

AWS is considered "secure" because it incorporates a level of foundational security that would be difficult for individual companies to achieve on their own. Examples include physical data center security, multi-layered network defenses, and service-level encryption and redundancy.

However, this assessment includes the infrastructure provided by AWS and does not guarantee the security of the entire system built by the user. Even on AWS, information leaks and misuse can occur if the configuration or operation is incorrect.

It's important to understand this expression not as meaning that it's safe without any intervention, but rather as meaning that there's a foundation for achieving a high level of safety if used with the correct assumptions.

Understanding AWS's Shared Responsibility Model

When considering AWS security, the first thing you need to understand is the "shared responsibility model." This isn't a difficult theory; it's simply a way of defining who is responsible for what.

If this premise is misunderstood, a situation can arise where what was thought to be "left to AWS" is actually the user's responsibility. Many security incidents arise not from the sophistication of the attack method, but from this misunderstanding.

Basic structure of the shared responsibility model

AWS's shared responsibility model divides security responsibilities for the cloud environment between AWS and the user.

Amazon Web Services guarantees the security of the cloud itself, including data centers, physical servers, and network infrastructure. However, users are responsible for the operating systems, applications, and data handled on top of that infrastructure.

The important point is that this division of responsibility "varies depending on the service." IaaS, PaaS, and SaaS have different scopes of management responsibilities for users. In other words, the shared responsibility model is not a choice between "AWS or us," but rather a framework for determining which layers of responsibility you should take on.

Scope of AWS responsibility

AWS is responsible for the security of the cloud infrastructure itself.

Specifically, this includes the physical security of the data center, the management of servers, storage, and network equipment, and redundancy and fault tolerance at the infrastructure level.

Users do not need to build or manage these infrastructures themselves. This is a major difference from on-premises solutions. However, AWS's responsibility is limited to its role as a cloud provider. The security of the infrastructure and the security of the systems built on top of it are two different things.

Scope of user responsibility

The user is responsible for the design, configuration, and operation of the system built on AWS. Who can perform which operations, which networks are exposed, how data is protected, and how anomalies are detected—all of these decisions are left to the user.

AWS offers many security features, but they are not automatically applied. Users are responsible for deciding how to use them, configuring them, and maintaining their operation. If you don't understand this, you'll end up in a situation where "security measures are in place, but incidents still occur."

H3 Common misunderstandings and misinterpretations that can lead to accidents

A typical misconception about the shared responsibility model is the idea that "because we're using AWS, AWS will take care of security." If you start operations with this understanding, excessive permissions may be left unaddressed, or unnecessary public settings may go unnoticed for a long time.

Another common issue is when countermeasures are only implemented during the initial setup, without considering subsequent changes or operational adjustments. As personnel changes and configuration modifications occur, the initial assumptions become invalid.

Accidents don't occur at the moment of a specific attack, but rather surface as a result of a series of misunderstandings and misinterpretations.

Basic rules for using AWS securely

AWS offers many security features and services, but you don't need to implement them all perfectly at once. The important thing is to understand the "basic rules" that are common to all environments and should never be omitted. These are not advanced attack countermeasures, but rather fundamental concepts that should be considered as prerequisites for design and operation.

Basics of Authentication and Permission Management (IAM)

Many security incidents stem from lax handling of authentication information or poor access control design. If you start operations without clearly defining who can perform which operations and to what extent, you cannot prevent errors and misuse.

The key is to avoid granting "just get it working" permissions. While excessively broad permissions may make work easier, they drastically increase the scope of impact in the event of an accident. The first step to using AWS safely is to clearly separate people from permissions and establish the premise of maintaining only the bare minimum necessary.

Network and accessibility concepts

In network design, it's essential to always be mindful of "how much of your network is exposed to the outside world." While AWS makes it easy to connect to the internet, there are many cases where the scope of exposure expands unintentionally.

The basic principle is to keep things closed as a rule and only open what is necessary. Exposing internal systems and management resources to the outside world will only increase the number of targets for attack. Networks are not designed once and then forgotten; they must be reviewed and revised every time the configuration changes or systems are added.

Reasons for assuming logging, monitoring, and detection

No matter how carefully you design, it's impossible to completely prevent configuration errors or unexpected operations. That's why, at AWS, the important thing isn't "preventing problems from happening," but "being able to notice them when they do happen."

Logs and monitoring are not just for troubleshooting. They are mechanisms for identifying suspicious operations and abnormal behavior early on and responding before damage spreads. Log acquisition and monitoring must be incorporated into the design based on the premise that a state of not being able to see the problem is the same as a state of not being able to take countermeasures.

Think of backup and recovery as your "last line of defense."

Even with robust authentication, networking, and monitoring systems in place, it's impossible to completely eliminate risks such as failures, user errors, and ransomware. This is where the concept of backup and recovery becomes crucial.

Backups are not just a "precautionary measure," but a last line of defense assuming something will go wrong. It's meaningless unless you consider not only how to protect your data, but also how far back you can revert and how long it will take to recover. Simply taking backups without considering recovery procedures is not safe.

The first thing you should understand about AWS security

The reason AWS security can seem difficult isn't the technical complexity itself. Often, it's because people try to build up security measures without clearly defining "how much is enough" or "what criteria should be used for judgment."

Let's move away from individual settings and service names for a moment and organize the fundamental concepts that should be considered first when thinking about AWS security.

You don't need to follow everything perfectly.

Trying to cover all of AWS's security-related services is unrealistic. There are always constraints on time, personnel, and operational structure. The important thing is not to aim for "perfection," but to prioritize protecting the highest-risk areas.

What aspects must be protected to avoid a fatal impact on operations and reputation? If you can make that determination, countermeasures can be implemented step by step. Assuming perfection is the goal can actually paralyze decision-making and lead to a situation where nothing is decided.

Most accidents are not due to sophisticated attacks, but rather to basic mistakes.

Many security incidents on AWS are not caused by cutting-edge attack techniques. They are the result of a series of basic mistakes, such as having too many permissions, exposing unnecessary resources, or failing to check logs.

Before implementing advanced security measures, it's more practical and effective to verify that basic assumptions are being followed. In AWS security, it's more important to question whether the obvious things are being overlooked than to focus on whether you're doing something complicated.

Security is compromised by operation, not by configuration.

Even with proper configuration during the initial setup, security is not guaranteed to be maintained solely through these means. The underlying assumptions gradually break down due to personnel changes, system additions, and the obsolescence of operational rules.

Security is not something that is "set once and done with"; it is something that must be maintained while anticipating change. Measures designed without considering operational changes become less and less effective over time.

There are decision-making criteria that should be decided before considering technology.

When considering AWS security measures, we tend to focus on "which service to use" and "which settings to implement." However, there are things that should be decided beforehand.

Which data should be protected? What level of risk is acceptable? What should be prioritized in the event of an accident? If these decision-making criteria remain unclear, even technical countermeasures will lack consistency. It is crucial to understand that technology is a result of judgment, not a substitute for judgment.

H2 AWS Security: Pitfalls to Avoid When Considering Security

AWS security measures can easily become ineffective if the underlying assumptions and concepts are flawed. Here, we'll outline some typical pitfalls that are repeatedly seen in AWS environments.

"It's okay because we're leaving it to AWS" - a kind of mental stagnation.

When using AWS, it's easy to develop a sense of security, thinking, "It's safe because AWS manages the infrastructure." However, if this perception goes too far, it can lead to a diminished awareness of the user's own responsibilities.

AWS provides a secure infrastructure, but it doesn't automatically handle configuration and operation. The moment you stop making decisions about permission design, exposure scope, and log review, security ceases to exist. The biggest risk is stopping thinking with the phrase "I'm leaving it to AWS."

The problem of becoming complacent after only the initial setup.

It's surprisingly common for security measures to be implemented during the initial setup, and then not reviewed or revised afterward. Settings that were appropriate at the time of construction may become outdated as systems are added or operations are modified.

The AWS environment changes rapidly, and its configuration is frequently updated. In this context, judging something as "security-protected" based solely on its initial state will lead to discrepancies with the actual situation. Security is not a deliverable at the time of construction; it requires continuous verification of underlying assumptions.

Risks caused by reliance on individuals and the creation of black boxes

If security design and operation depend on a specific person, decisions and responses become impossible when that person is absent. If the intent and background of the settings are not shared, it can lead to hesitation in making changes or, conversely, careless modifications.

While AWS offers flexibility in configuration, this freedom can also contribute to black box issues. A "only those who understand it understand it" situation is a dangerous state in terms of security. Environments where the assumptions behind the design and operation are not clearly defined and shared will inevitably harbor risks over time.

Summary

AWS security isn't achieved simply by adding specific services or settings. While AWS provides a secure infrastructure, how you use and operate it is your responsibility. Understanding this premise correctly is crucial to success.

The important thing is not to aim for perfect security measures, but to determine the scope and priorities of what needs to be protected, based on a shared responsibility model. Many incidents are not due to sophisticated attacks, but rather to basic mistakes such as lack of authority, scope of disclosure, or operational omissions.

To continue using AWS securely, a clear set of criteria for decision-making and an operational mindset are more important than the configuration itself. Clarifying what to protect and what to allow is the practical first step in AWS security.

Kazuki Kato
The person who wrote the article
Kazuki Kato

Server Works Co., Ltd.
Marketing Department, Marketing Section 1
After working in sales for independent ISPs and system integrators, where I was involved in optimizing customers' systems and networks, I joined Serverworks. Since joining, I have worked on development standardization projects for power carriers and proposed and implemented station announcement systems for railway operators. Currently, I am in charge of event marketing and inside sales.
My hobby is washing cars.
AWS Certified Database – Specialty (DBS)

If you have any questions about AWS,
issues like these?

If you have any questions or concerns about using AWS, getting quotes, configuring your system, or operating it, please feel free to contact us.
We help facilitate smooth decision-making by establishing a shared understanding with the local team and clarifying the prerequisites.

We offer end-to-end solutions to address all your AWS-related challenges.

Image of a city nightscape intersecting with blue lines of light symbolizing a digital network