www.cdw.com
Open in
urlscan Pro
23.6.125.138
Public Scan
URL:
https://www.cdw.com/content/cdw/en/articles/security/aws-security-best-practices-checklist.html
Submission: On September 06 via manual from VN — Scanned from DE
Submission: On September 06 via manual from VN — Scanned from DE
Form analysis
1 forms found in the DOM<form id="gh-header-search-form" role="search" style="top: 64px;">
<div id="main-search">
<input id="search-input" type="text" placeholder="What can we help you find today?" class="search-input" data-rrapiidentifier="rrc" data-disabletypeahead="False" data-enablefusion="False" data-enablefusiontypeahead="False" autocomplete="off"
role="menuitem" aria-label="Search input field" aria-haspopup="true" aria-expanded="false" onclick="CdwTagMan.createPromotionTag('Global Navigation', 'Search Bar');" maxlength="1350">
<button id="gh-header-search-form-x" tabindex="0" aria-label="Clear search input" style="display: none;"></button>
<button type="submit" id="gh-header-button-search" aria-label="Search button" tabindex="0"></button>
</div>
<div id="gh-search-results" class="search-dropdown">
<div class="search-dropdown-wrapper">
<div class="results-content"></div>
</div>
</div>
</form>
Text Content
Shipping Delays: Due to global supply chain constraints, delivery on some items may be delayed. Learn More * Hardware * Software * Services * IT Solutions * Brands * Research Hub * Cables * Computer Accessories * Computer Monitors & Displays * Computers * Electronics * Networking * Office Equipment & Supplies * Phones & Video Conferencing * Power * Printers & Supplies * Servers & Server Management * Storage & Hard Drives * * Outlet * Finders * Back to All Hardware Browse all Cables Audio & Video Cables Cable Management Cables & Connectors Cable Connectors Power Cables Ethernet Cables Cat 6 Cables Fiber Optic Cables Network Cables Monitor Cables & Adapters USB Cables & Adapters USB Adapters USB Cables USB Hubs RARITAN CABLES Complete your connectivity needs with Raritan solutions. Shop Now C2G AUDIO/VIDEO CABLES Enable easy interconnection between digital display devices. Shop Now Back to All Hardware Browse all Computer Accessories Computer Components Computer Memory CPUs Motherboards Docking Stations & Port Replicators Keyboards & Mice Keyboards Keyboard & Mouse Bundles Mice Laptop Accessories Laptop Batteries Laptop Chargers & Adapters Laptop Memory Laptop Cases & Bags Carrying Cases Tablet Accessories Tablet Cases Webcams Memory Finder LOGITECH MX KEYS COMBO Support advanced workflow needs and boost productivity with this wireless, ergonomic combo. Shop Now ZAGG DEVICE ACCESSORIES Keep your devices safe on-the-go with ZAGG InvisibleShield screen protection and durable cases. Shop Now Back to All Hardware Browse all Computer Monitors & Displays Computer Monitors Large-Format Displays Monitor Accessories Monitor Cables & Adapters Monitor Mounts Privacy Screens Projectors Document Cameras Office Projectors Projector Accessories TV & Video Streaming Devices TVs LUMENS DOCUMENT CAMERAS These USB document cameras provide outstanding image quality and come with a five-year warranty. Shop Now BENQ RP7502 75" Foster better collaboration with a smart, interactive whiteboard. Shop Now Back to All Hardware Browse all Computers Desktops All-in-One Computers Mini PCs Workstations Laptops & 2-in-1s 2-in-1 Laptops Laptops Tablets 12TH GEN INTEL VPRO PLATFORM Browse the latest PCs, powered by Intel Core vPro processors. Shop Now ASUS NOTEBOOKS Improve on-the-go work efficiency with a lightweight, precise design and 14-hour battery life. Shop Now Back to All Hardware Browse all Electronics Cameras & Video Cameras Cameras Drones & Accessories Video Cameras Cell Phones & Accessories Cell Phones Cell Phone Cases Headphones Microphones & Audio Systems Smartwatches STEM & Robotics TV & Video Streaming Devices TV Accessories TVs APPLE AIRPODS Share audio and switch effortlessly between all your devices. Shop Now GALAXY TAB S8 SERIES Powerful, lightweight and portable Galaxy tablets for large and small businesses. Shop Now Back to All Hardware Browse all Networking Network Adapters Ethernet Adapters Host Bus Adapters Transceiver Modules Network Management Network Security Firewalls & VPN Security Appliances Security Tokens Routers Security Cameras & Surveillance Proximity Cards & Readers Security Cameras Switches Ethernet Switches Fiber Channel Switches Modular Switches Wireless Access Points PROLINE GLC-T-10G TRANSCEIVER Transfer data at 10 Gbps for optimal workflows across the data link. Shop Now LINKSYS WIRELESS ROUTERS Unleash multi-gigabit speed to multiple devices at a time for reliable, high-speed Wi-Fi. Shop Now Back to All Hardware Browse all Office Equipment & Supplies Charging Carts Furniture Office Furniture Sit & Stand Desks Smart Boards Medical & Utility Carts Point of Sale Barcode Scanners & Accessories POS Peripherals Credit Card Readers Signature Pads Thermal Printers & Supplies Label Printers Thermal Printers ERGOTRON CHARGING CARTS Charge, store and transport mini-laptops, tablets, Chromebooks and other devices. Shop Now ZEBRA DS3678-SR Easily capture 1D and 2D barcodes with this cordless, rugged scanner. Shop Now Back to All Hardware Browse all Phones & Video Conferencing Cell Phones & Accessories Cell Phones Cell Phone Accessories Cell Phone Cases Headphones Headsets Wireless Headsets Wired Headsets Headset Accessories Phones Conference & Speaker Phones Landline Phones VoIP Phones Phone Accessories Video Conferencing Conference Room Cameras Video Conference Systems YEALINK WH66 This wireless headset connects to multiple devices and transforms your desk into a full workstation. Shop Now LG COLLABORATION SOLUTIONS Enable better collaboration with up to 20 points of simultaneous touch. Shop Now Back to All Hardware Browse all Power Battery Backups UPS Accessories UPS Battery Backups UPS Battery Replacements Computer Accessories Laptop Chargers & Adapters Power Supplies Power Management Power Strips & Surge Protectors Racks & Enclosures Air Distribution & Cooling Rack Accessories Racks & Cabinets Battery & Power Finder EATON 5PX G2 UPS Provide battery backup and power protection for your valuable IT equipment. Shop Now TRIPP LITE UPS FINDER Power and protect everything from workstations to critical systems. Shop Now Back to All Hardware Browse all Printers & Supplies All-in-One Printers Ink & Toner Inkjet Cartridges Toner Cartridges Large Format & Plotter Printers Laser Printers Printer Supplies & Accessories Maintenance Kits & Waste Toner Paper & Labels Printer Accessories Scanners & Accessories Barcode Scanners Document Scanners Scanner Accessories Thermal Printers & Supplies Ink & Toner Finder BROTHER MFC-L6750DW Support high volume printing, copying and scanning needs with speeds up to 48 pages per minute. Shop Now CANON IMAGECLASS D1620 Balance speedy performance, minimal maintenance and expanded paper capacity for busy groups. Shop Now Back to All Hardware Browse all Servers & Server Management Server Components Server Accessories Server Memory Servers Blade Servers Rack Servers Server Management KVM Consoles KVM Modules KVM Switches Memory Finder HPE PROLIANT SERVERS Combine high-performance, flexibility, improved uptime and increased security. Shop Now AMD EPYC PROCESSORS AMD-powered servers help accelerate application and workload performance. Shop Now Back to All Hardware Browse all Storage & Hard Drives Drive Arrays Duplicators Flash Arrays Hard Drive Arrays Hard Drives Internal Hard Drives External Hard Drives Network Attached Storage Solid State Drives Storage Media DVD & Blu-Rays Tape Cartridges Storage Mounts & Enclosures USB Flash Drives Memory Finder KINGSTON FURY RENEGADE These SSDs provide blazing-fast speeds and high IOPS for extreme gaming and hardware performance. Shop Now PURE STORAGE FLASHBLADE Consolidate fast file and object data with Pure Storage's advanced, all-flash storage solution. Explore Now * Software * Business Applications * Communication * Graphics & Design * Networking & Servers * Operating Systems * Programming & Web Development * Security * Utilities * Virtualization * * Popular Software Titles * * Subscriptions Back to All Software Browse all Software Business Applications Communication Education Graphics & Design Networking & Servers Operating Systems Programming & Web Development Security Utilities Virtualization Back to All Software Browse all Business Applications Application Suites Document Management Reporting & Data Analytics GOOGLE WORKSPACE Help teams of all sizes connect, create and collaborate with an innovative solution to achieve more. Shop Now KOFAX POWER PDF Make it easy to create, edit, enhance, redact and automate your PDF documents. Shop Now Back to All Software Browse all Communication E-mail Mobile Device Management Phones & VoIP ZENDESK SUITE A complete customer service solution that’s easy to use and powerful to scale. Explore Now JAMF SOLUTIONS Maximize user productivity with powerful workflows for Mac, iPad, iPhone and AppleTV. Explore Now Back to All Software Browse all Graphics & Design CAD & CAM Drawing Animation & 3D BOX ENTERPRISE Protect content, streamline workflows and connect business all through the Box Content Cloud. Shop Now AUTOCAD 2023 AutoCAD drives design forward with enhanced automation and specialized toolsets. Shop Now Back to All Software Browse all Networking & Servers Data Archiving Network Management Storage Networking CHROMEOS Secure, optimize and better manage your contact center with ChromeOS. Explore Now PRTG NETWORK PERFORMANCE MONITOR Get 24/7 monitoring for your LANs, WANs, servers, websites, appliances, URLs and more. Shop Now Back to All Software Browse all Operating Systems Windows Network Operating Systems IBM DB2 DATABASE Enhance data management and deliver any data, anywhere. Explore Now VERITAS NETBACKUP 10 Backup and recover your data with one enterprise solution, regardless of where it lives. Explore Now Back to All Software Browse all Programming & Web Development Databases DevOps Web Development RED HAT ENTERPRISE VIRTUALIZATION Automate, manage and modernize your virtualized workloads. Explore Now IBM DB2 DATABASE Enhance data management and deliver any data, anywhere. Explore Now Back to All Software Browse all Security Authentication Endpoint Security Firewalls SYMANTEC ENDPOINT SECURITY Get unmatched protection, detection and response across the entire attack chain. Explore Now ATTACK SURFACE MANAGEMENT Quickly understand threats to discovered assets and outline risks to the organization. Explore Now Back to All Software Browse all Utilities Backup Cloning Network Utilities ACRONIS CYBER BACKUP Protect your data from any threat with a single solution. Shop Now VERITAS NETBACKUP 10 Backup and recover your data with one enterprise solution, regardless of where it lives. Explore Now Back to All Software Browse all Virtualization Application Virtualization Client Virtualization Server & Network Virtualization THALES CLOUD SECURITY Protect and control access to sensitive data across the cloud, data centers and network. Shop Now DRAGON MEDICAL ONE Create comprehensive clinical documentation and navigate workflows using just your voice. Shop Now Back to All Software Adobe Acrobat Adobe Creative Cloud Microsoft Azure Microsoft 365 Microsoft Office 365 Microsoft SQL Server 2017 Microsoft Windows 10 * CDW Amplified™ Services * * eProcurement Integration * Warranty Services * Back to All Services Browse all CDW Amplified™ Services Configuration Services Data Services Development Services Infrastructure Services Multicloud Services Security Services Advisory Services Physical Security Services Support Services Workspace Services CDW Amplified Services Overview AMPLIFIEDTM DEVELOPMENT SERVICES Streamline delivery through DevOps and modernize applications that drive your business. AMPLIFIEDTM DATA SERVICES Design, build and deploy a modern data platform built for analytics and AI/ML solutions to operationalize your data. * Analytics * Cybersecurity * Data Center & Network Infrastructure * DevOps * Digital Signage * Digital Transformation * Digital Workspace Solutions * Print Solutions * IT Asset Management * * IT Solutions by Industry * Back to All IT Solutions Analytics DATA-DRIVEN DECISIONS Harnessing your data to gain a competitive advantage is as much a challenge as it is an opportunity. Data-driven decision making can help you achieve this opportunity. IT OPERATIONAL ANALYTICS IT operational analytics can help you gain real answers to problems and create more efficient workflows in your organization. BUSINESS INTELLIGENCE Build a meaningful business intelligence strategies by leveraging your goals, data and analytics tools. Learn More About Analytics Back to All IT Solutions Browse all Cybersecurity Cloud Security Emerging Cybersecurity Technologies Information Security Network Security Back to All IT Solutions Browse all Data Center & Network Infrastructure Data Center Power and Cooling Data Storage Hyperconverged Infrastructure IaaS Network Management Server Room Technology Virtualization Back to All IT Solutions DevOps ORGANIZATIONAL EFFICIENCY CDW partners with local, national and global organizations to help bridge the gap between IT and business groups. CLOUD GOVERNANCE A cloud-native approach to DevOps can deliver instant business insights and control cloud consumption costs. INFRASTRUCTURE AS CODE IaC allows for custom scripts that can automate infrastructure provisioning, security and more. Learn more about DevOps Back to All IT Solutions Digital Signage VIDEO WALLS CDW can help you create visually impressive video walls that are easy to install, manage and maintain. OUTDOOR DISPLAYS We'll help you captivate viewers with fully enclosed and weather-proof outdoor displays designed to endure extreme temperature changes. DIRECT VIEW LED Direct view LEDs help you captivate viewers with fine pixel pitch signage for a stunning large-scale viewing experience. Learn More About Digital Signage Back to All IT Solutions Browse all Digital Transformation Education Energy Healthcare Manufacturing Retail State & Local Government Back to All IT Solutions Browse all Digital Workspace Solutions Communications Future of Work Management & Security Mobile Devices Productivity Apps Research Hub Work From Home Back to All IT Solutions Browse all Print Solutions Managed Print Programs Printer Supplies Program Back to All IT Solutions IT Asset Management WHAT IS IT ASSET MANAGEMENT? Look to IT Asset Management as a way to proactively manage your IT investments, so you keep spending in check and maximize value. THE PILLARS OF ITAM SUCCESS CDW’s holistic approach to ITAM ensures that you can make the most of your IT investments. ITAM SOLUTIONS CDW’s ITAM team offers a range of solutions tailored to fit your organization’s specific needs. Learn More About IT Asset Management Back to All IT Solutions Browse all IT Solutions by Industry Energy & Utilities Federal Government Financial Services Healthcare Higher Education K-12 Education Nonprofit Retail Small Business Startups State & Local Government Featured Brand Partners * Browse All Brands * # * A * B * C * D * E * F * G * H * I * J * K * L * M * N * O * P * Q * R * S * T * U * V * W * X * Y * Z Notifications Notifications Sign In Sign In Save up to 5% on product purchases with your account. Create Account Learn all about a CDW Account Save up to 5% on product purchases when you open an account. Create Account Have an account? Sign In Cart $0.00 YOU HAVE NO ITEMS IN YOUR CART Subtotal: $0.00 View Cart Checkout * Hardware * Software * Services * IT Solutions * Brands * Research Hub Link copied Research Hub > AWS Security Best Practices Checklist October 22, 2021 * * * * * * Copy Link Article 8 min AWS SECURITY BEST PRACTICES CHECKLIST While AWS security can be managed via a third party, some responsibilities must be addressed in-house. Every day, more professional industries are taking their business online, and that means the need for adequate cybersecurity is at an all-time high. AWS security services can provide near limitless benefits to all aspects of your business or organization. Many of those services can be managed by a third party, saving you even more time, money, and hassle. While AWS security can be managed via a third party, some responsibilities must be addressed in-house. Following a set of AWS security best practices can help ensure that every aspect of your AWS services is as safe as possible and operating as intended. Whether you’re new to AWS or already on your journey, CDW Amplified™ Services for AWS can support you in achieving your business objectives. Explore AWS Services WHAT IS AWS SECURITY? Amazon web services (AWS) is a collection of comprehensive cloud-based services designed to help with all facets of a business. AWS security is the services provided by AWS that center on cybersecurity, including but not limited to employee access, data storage, and network monitoring. These services include a mix of on-site and cloud-based hardware, which work together to maximize safety and efficiency. By learning more about AWS security practices, you can ensure the best possible cybersecurity for your growing business. AWS SECURITY BEST PRACTICES CHECKLIST Below, you can find a list of best practices that can be used to strengthen your AWS cloud security. There are other policies and procedures you can implement based on your specific industry, but these options are standard for most AWS clients and can be applied to any business. Some practices may be as easy as performing regular data backups or creating appropriate password policies but can go a long way in increasing overall security. By following this checklist, you can help ensure that your cloud-based and in-house services are as secure as possible: 1. CREATE STRONG PASSWORD POLICIES The first step in any form of cybersecurity is to establish strong password policies as soon as possible. This can include creating password requirements that use numbers, letters, and special characters. By requiring these additional characters, you make passwords exponentially harder to crack. Another policy for password protection is to implement a reset schedule. Using a reset schedule to change employee credentials regularly prevents any fallout from disgruntled former employees and adds another layer of security to passwords. Third-party password management tools and services are other options that can automate similar policies and take the stress of password management off your hands. 2. IMPLEMENT MULTI-FACTOR AUTHENTICATION (MFA) Sometimes, even the most robust password can be breached. An affordable and easy way to prevent this is to use what is called multi-factor authentication. This means that employees or clients wishing to access the network will need their password and a secondary device to log in. Secondary devices can come in various formats, including physical devices such as key chains or flash drives or software like a smartphone app. What these additional devices do is provide time-based credentials required for access. These added credentials are reset at regular intervals so that the secondary device must always be present to log in. By using MFA, you can ensure that only current employees with regulated equipment can access your network. 3. USE EMAIL ALIASES There will always be a root account with top-level control of all aspects of operations when using AWS services. This means that certain AWS services can only be seen and accessed using one set of login credentials. The drawback to this is that the cloud operates 24/7, and you may not always be available when a notification comes in or a service needs to be managed quickly. A solution for this is using a group email alias. By using a group alias, multiple trusted company employees can share access to top-level services. This way, if you are unable to see a notification or be present to manage services, operations can still continue without delay. 4. SET UP AWS IDENTITY & ACCESS MANAGEMENT (IAM) Identity and Access Management (IAM) is a tool you can use to create specific identities within your network based on access permissions. This service allows the creation of users, groups, and roles, each with separate permissions set by an administrator. IAM can also be helpful for onboarding new employees, because they can quickly be assigned to a role or group based on their department. The biggest strength of IAM is that it gives you the power to strictly monitor and control access to a network or services within your business. 5. PERFORM REGULAR DATA BACKUPS Backing up data is standard practice in most industries, but how and when you backup data can make a huge difference in damage mitigation and restoration times. Much like with password reset schedules, planned data backups create an added layer of protection for your business without halting regular operations. A data backup is only as valuable as the data included in it. If a significant amount of time has passed between a backup and a loss of data, any content created in between is lost. By setting a schedule and creating regular backups, you can ensure a minimal loss of information and get back up and running as quickly as possible. 6. CREATE A COMPANY CULTURE OF SECURITY While somewhat more abstract than other practices, creating a company culture of security is imperative to getting the most out of your AWS security services. By discussing common security threats and questions with employees, you can make them feel more comfortable with AWS services. The greater an employee's knowledge of security services, the better they will be protected—and having a company culture based on cybersecurity helps to provide those benefits. 7. MAINTAIN REGULATORY COMPLIANCE Cloud services are always running and frequently receive updates to services and regulations. Depending on the type of data you store or the services your business provides, regulations pertaining to your network can quickly change. Maintaining awareness of cloud events is critical to staying compliant and ensuring your AWS services are running correctly. In order to maintain compliance, a business must have a continuous understanding of regulations and any changes that might affect operations. The benefit of maintaining compliance is that it guarantees access to the newest data sources and connections within the cloud. 8. KEEP POLICIES UP TO DATE As stated earlier, cloud services are constantly operating and can frequently change or be updated. Keeping your policies up to date with software or service changes is essential to network security. Updates and changes can create weak spots within a network that can lead to network breaches or loss of sensitive data if not addressed. In many scenarios, policies will need to be updated to maintain compliance with new regulations or AWS standards. By staying up to date with security policies, you guarantee regulatory compliance and ensure a higher level of network security. 9. MANAGE ROOT ACCESS As mentioned before, an AWS service account will have root credentials that provide the highest level of access to a network. A possible problem with this is that if those credentials are breached, the entire network is in danger, and malicious parties could gain total control of your network. IAM can combat this risk by creating a top-level user account with the same permissions as a root user that is accessed via different login credentials. That way, if one set of top-level access is breached, there is another available to tackle the problem quickly. MFA is another solution to this problem as it exponentially increases the difficulty of hacking login credentials. 10. USE THIRD-PARTY AWS MANAGEMENT Whether you already use some form of AWS security or you are looking to expand your business via cloud solutions, you may need some additional help along the way. Third-party providers such as the experts at CDW are available to access, develop and/or manage your AWS security services at any time. CDW managed services for AWS include: * Security and Capacity Adviser: Identify common security gaps and provides recommendations for right-sizing compute and storage. * Budget Adviser: Track consumption by business unit, auto-generate reports (i.e., consumption tracking by department, auto-generated reports) * Billing Adviser: Get graphical views of AWS spend. * LaunchPad: Receive AWS and CloudHealth enablement from a CDW AWS Technical Account Manager. * Consolidated Billing and Leverage Net Terms: Receive your AWS invoices from CDW and leverage your CDW net payment terms (approval required). * Leverage Your Trusted CDW Team: You get all of these benefits while working with your usual CDW contacts. * No Charge to You: CDW will provide these services at no charge to you if you switch your AWS billing to CDW. SUMMARY AWS security services are an excellent and affordable way to protect your business from any cybersecurity threat. These services can range from access management to data storage and are crucial to the productivity and longevity of your business. When disaster strikes, AWS services are ready around the clock to work for you and minimize downtime and data loss. By implementing these AWS security best practices, you can optimize your AWS security services and reduce any potential areas of fault. Depending on your business, there may be more specific policies you may wish to implement, but following a standard list of practices is a great place to start and can benefit any organization. ACHIEVE YOUR AWS SECURITY OBJECTIVES WHEN YOU SWITCH TO CDW WE GET GETTING RESULTS With full-stack expertise, CDW helps you design, orchestrate and manage technologies that drive business success. * * * * * What We Solve * Research Hub * Products * My Account * Quick Order Status ABOUT US * Why CDW * About Us * Careers * Investor Relations * Diversity and Inclusion * ESG * International Solutions * Locations * Newsroom & Media * Suppliers HOW CAN WE HELP * Customer Support / FAQs * eProcurement * e-Waste Recycling * Leasing Services * Product Recalls * Corporate Gifts * Product Finders * CDW Outlet CONTACT AN EXPERT: P 800.800.4239 | Email Us * CDW * CDW-G * Canada * CDW-UK Site Map Privacy Notice Cookie Notice Terms and Conditions Copyright © 2007 - 2022 CDW. All Rights Reserved. CDW®, CDW•G® and PEOPLE WHO GET IT® are registered trademarks of CDW LLC. All other trademarks and registered trademarks are the sole property of their respective owners. Would you be willing to take a short, 4-question survey about your site experience? Yes No