{"id":4732,"date":"2022-04-13T15:49:39","date_gmt":"2022-04-13T09:19:39","guid":{"rendered":"https:\/\/iatmm.com\/?p=4732"},"modified":"2022-04-13T15:50:18","modified_gmt":"2022-04-13T09:20:18","slug":"security-in-amazon-ec2%ef%bf%bc","status":"publish","type":"post","link":"https:\/\/iat.edu.mm\/security-in-amazon-ec2%ef%bf%bc\/","title":{"rendered":"Security in Amazon EC2\ufffc"},"content":{"rendered":"\n<p>Cloud Security \u101f\u102c AWS \u1019\u103e\u102c \u1021\u1019\u103c\u1004\u1037\u103a\u1006\u102f\u1036\u1038 \u1026\u1038\u1005\u102c\u1038\u1015\u1031\u1038\u1015\u102b\u104b Security \u1021\u101b \u1021\u1019\u103e\u102c\u1038\u1019\u1001\u1036\u1014\u102d\u102f\u1004\u103a\u1010\u1032\u1037\u104a \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1019\u103e\u102f\u101e\u102c \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1006\u102f\u1036\u1038\u1015\u102b\u1006\u102d\u102f\u1010\u1032\u1037 Security-sensitive Organizations \u1010\u103d\u1031\u101b\u1032\u1037 \u101c\u102d\u102f\u1021\u1015\u103a\u1001\u103b\u1000\u103a\u1010\u103d\u1031\u1014\u103e\u1004\u1037\u103a \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1021\u1031\u102c\u1004\u103a\u1010\u100a\u103a\u1006\u1031\u102c\u1000\u103a\u1011\u102c\u1038\u1010\u1032\u1037 Data Center \u1014\u103e\u1004\u1037\u103a Network Architecture \u101b\u103e\u102d\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>Security \u1021\u1010\u103d\u1000\u103a AWS \u1018\u1000\u103a\u1000\u101b\u1031\u102c\u104a \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101e\u1030 Customer \u1018\u1000\u103a\u1000\u1015\u102b \u1019\u103b\u103e\u101d\u1031\u1010\u102c\u101d\u1014\u103a\u101a\u1030\u1000\u103c\u101b\u1010\u1032\u1037 Shared Responsibility \u1015\u102f\u1036\u1005\u1036\u1015\u102b\u104b<em><mark style=\"background-color:rgba(0, 0, 0, 0);color:#b41d8d\" class=\"has-inline-color\">Shared Responsibility Model<\/mark><\/em> \u1000\u102d\u102f \u201cSecurity <em><mark style=\"background-color:rgba(0, 0, 0, 0);color:#b41d8d\" class=\"has-inline-color\">OF <\/mark><\/em>the Cloud\u201d \u1014\u103e\u1004\u1037\u103a \u201cSecurity <em><mark style=\"background-color:rgba(0, 0, 0, 0);color:#b41d8d\" class=\"has-inline-color\">IN<\/mark><\/em> the Cloud\u201d \u101f\u102f (\u1042) \u1019\u103b\u102d\u102f\u1038 \u1001\u103d\u1032\u1001\u103c\u102c\u1038\u1015\u103c\u102e\u1038 \u1016\u1031\u102c\u103a\u1015\u103c\u1015\u102b\u1010\u101a\u103a\u104b AWS \u1018\u1000\u103a\u1019\u103e Host OS \u1014\u103e\u1004\u1037\u103a Virtualization Layer \u1019\u103e\u1005\u1015\u103c\u102e\u1038 AWS Services \u1010\u103d\u1031 \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1014\u1031\u1010\u1032\u1037 Facilities \u1010\u103d\u1031\u101b\u1032\u1037 Physical Security \u1010\u103d\u1031\u1021\u1011\u102d \u1015\u102b\u101d\u1004\u103a\u101e\u1019\u103b\u103e Components \u1010\u103d\u1031\u101b\u1032\u1037 Operation, Management \u1014\u103e\u1004\u1037\u103a Control \u1015\u102d\u102f\u1004\u103a\u1038\u1010\u103d\u1031 \u1010\u102c\u101d\u1014\u103a\u101a\u1030\u1015\u103c\u102e\u1038 Customer \u101b\u1032\u1037 Operational Burden \u1000\u102d\u102f \u101c\u103b\u1031\u102c\u1037\u1015\u102b\u1038\u101e\u1000\u103a\u101e\u102c\u1005\u1031\u1010\u102c\u1019\u103b\u102d\u102f\u1038\u1015\u102b\u104b<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#b41d8d\" class=\"has-inline-color\">Security <em>OF<\/em> the Cloud<\/mark><\/strong><\/p>\n\n\n\n<p>AWS \u101f\u102c AWS Services \u1010\u103d\u1031 \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1014\u1031\u1010\u1032\u1037 Infrastructure \u1000\u102d\u102f \u1000\u102c\u1000\u103d\u101a\u103a\u1015\u1031\u1038\u1016\u102d\u102f\u1037 \u1010\u102c\u101d\u1014\u103a\u101a\u1030\u1015\u102b\u1010\u101a\u103a\u104b Services \u1010\u103d\u1031\u1000\u102d\u102f \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1005\u102d\u1010\u103a\u1001\u103b\u1005\u103d\u102c \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101c\u102d\u102f\u1037\u101b\u1005\u1031\u1015\u102b\u1010\u101a\u103a\u104b Infrastructure \u101c\u102d\u102f\u1037\u1006\u102d\u102f\u101b\u102c\u1019\u103e\u102c AWS Cloud Services \u1010\u103d\u1031 \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1014\u1031\u1010\u1032\u1037 Hardware, Software, Networking \u1014\u103e\u1004\u1037\u103a Facilities \u1010\u103d\u1031 \u1021\u102c\u1038\u101c\u102f\u1036\u1038\u1015\u102b\u101d\u1004\u103a\u1010\u102c\u1015\u102b\u104b &nbsp;AWS Compliance Programs \u1010\u103d\u1031\u101b\u1032\u1037 \u1010\u1005\u102d\u1010\u103a\u1010\u1015\u102d\u102f\u1004\u103a\u1038\u1021\u1016\u103c\u1005\u103a AWS Security \u101b\u1032\u1037 \u1011\u102d\u101b\u1031\u102c\u1000\u103a\u1019\u103e\u102f\u104a \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1005\u102d\u1010\u103a\u1001\u103b\u101b\u1019\u103e\u102f\u1000\u102d\u102f Third-party Auditors \u1010\u103d\u1031\u1019\u103e \u1015\u102f\u1036\u1019\u103e\u1014\u103a\u1005\u1005\u103a\u1006\u1031\u1038\u104a \u1021\u1010\u100a\u103a\u1015\u103c\u102f\u1010\u102c\u1010\u103d\u1031\u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#b41d8d\" class=\"has-inline-color\">Security <em>IN<\/em> the Cloud<\/mark><\/strong><\/p>\n\n\n\n<p>AWS Customer \u101b\u1032\u1037 \u1010\u102c\u101d\u1014\u103a\u101a\u1030\u101b\u1019\u103e\u102f\u101f\u102c Customer \u101b\u103d\u1031\u1038\u1001\u103b\u101a\u103a\u1010\u1032\u1037 Service \u1015\u1031\u102b\u103a\u1019\u1030\u1010\u100a\u103a\u1015\u102b\u1010\u101a\u103a\u104b Infrastructure as a Service (IaaS) \u1021\u1016\u103c\u1005\u103a \u101e\u1010\u103a\u1019\u103e\u1010\u103a\u1011\u102c\u1038\u1010\u1032\u1037 EC2 \u101c\u102d\u102f Services \u1021\u1010\u103d\u1000\u103a \u101c\u102d\u102f\u1021\u1015\u103a\u1019\u101a\u1037\u103a Security Configuration \u1014\u103e\u1004\u1037\u103a &nbsp;Management Tasks \u1010\u103d\u1031\u1021\u102c\u1038\u101c\u102f\u1036\u1038\u101f\u102c Customer \u101b\u1032\u1037 \u1010\u102c\u101d\u1014\u103a\u1015\u102b\u1015\u1032\u104b Customer \u101b\u1032\u1037 \u1010\u102c\u101d\u1014\u103a\u101a\u1030\u101b\u1019\u103e\u102f\u1000\u102d\u102f \u1021\u1001\u102f\u101c\u102d\u102f (\u1044) \u1015\u102d\u102f\u1004\u103a\u1038\u1001\u103d\u1032\u1011\u102c\u1038\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u1019\u102d\u1019\u102d\u1010\u102d\u102f\u1037 Instances \u1010\u103d\u1031\u101b\u1032\u1037&nbsp; Network Access \u1000\u102d\u102f \u1011\u102d\u1014\u103a\u1038\u1001\u103b\u102f\u1015\u103a\u101b\u1015\u102b\u1019\u101a\u103a\u104b \u1025\u1015\u1019\u102c &#8211; VPC &amp; Security Groups Configuration<\/li><li>Instances \u1010\u103d\u1031\u1000\u102d\u102f \u1001\u103b\u102d\u1010\u103a\u1006\u1000\u103a\u101b\u102c\u1019\u103e\u102c \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1019\u101a\u1037\u103a \u101c\u103b\u103e\u102d\u102f\u1037\u101d\u103e\u1000\u103a\u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a Credentials \u1019\u103b\u102c\u1038\u1000\u102d\u102f \u1005\u102e\u1019\u1036\u1001\u1014\u1037\u103a\u1001\u103d\u1032\u1001\u103c\u1004\u103a\u1038<\/li><li>Guest OS \u1014\u103e\u1004\u1037\u103a \u1021\u1010\u1030\u1010\u103d\u1032\u101e\u102f\u1036\u1038\u1019\u101a\u1037\u103a Software \u1019\u103b\u102c\u1038\u1021\u1010\u103d\u1000\u103a Updates \u1014\u103e\u1004\u1037\u103a Security Patches \u1019\u103b\u102c\u1038\u1000\u102d\u102f \u1005\u102e\u1019\u1036\u1001\u1014\u1037\u103a\u1001\u103d\u1032\u1001\u103c\u1004\u103a\u1038<\/li><li>Instances \u1010\u103d\u1031\u1021\u1010\u103d\u1000\u103a IAM Roles \u1019\u103b\u102c\u1038\u1001\u103b\u1019\u103e\u1010\u103a\u1015\u103c\u102e\u1038 \u101e\u1000\u103a\u1006\u102d\u102f\u1004\u103a\u101b\u102c Permissions \u1019\u103b\u102c\u1038 \u101e\u1010\u103a\u1019\u103e\u1010\u103a\u1001\u103c\u1004\u103a\u1038<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Security \u101f\u102c AWS \u1019\u103e\u102c \u1021\u1019\u103c\u1004\u1037\u103a\u1006\u102f\u1036\u1038 \u1026\u1038\u1005\u102c\u1038\u1015\u1031\u1038\u1015\u102b\u104b Security \u1021\u101b \u1021\u1019\u103e\u102c\u1038\u1019\u1001\u1036\u1014\u102d\u102f\u1004\u103a\u1010\u1032\u1037\u104a \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1019\u103e\u102f\u101e\u102c \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1006\u102f\u1036\u1038\u1015\u102b\u1006\u102d\u102f\u1010\u1032\u1037 Security-sensitive Organizations \u1010\u103d\u1031\u101b\u1032\u1037 \u101c\u102d\u102f\u1021\u1015\u103a\u1001\u103b\u1000\u103a\u1010\u103d\u1031\u1014\u103e\u1004\u1037\u103a \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1021\u1031\u102c\u1004\u103a\u1010\u100a\u103a\u1006\u1031\u102c\u1000\u103a\u1011\u102c\u1038\u1010\u1032\u1037 Data Center \u1014\u103e\u1004\u1037\u103a [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4733,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70,64,18],"tags":[],"class_list":["post-4732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws","category-iat-courses","category-knowledge-sharing"],"_links":{"self":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/4732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/comments?post=4732"}],"version-history":[{"count":3,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/4732\/revisions"}],"predecessor-version":[{"id":4736,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/4732\/revisions\/4736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media\/4733"}],"wp:attachment":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media?parent=4732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/categories?post=4732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/tags?post=4732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}