Skip to main content

AWS Security Specialty Certification: How to Prepare for the Exam

Nitheesh PoojaryOctober 16, 2024About 15 minDevOpsAmazonAWSArticle(s)blogfreecodecamp.orgdevopsawsamazon-web-services

AWS Security Specialty Certification: How to Prepare for the Exam 관련

AWS > Article(s)

Article(s)

AWS Security Specialty Certification: How to Prepare for the Exam
Welcome to my latest tutorial! After a three-year hiatus from certifications, I'm thrilled to announce that I've successfully obtained the AWS Certified Security Specialty certification. As someone who strongly believes in the power of community lear...

Welcome to my latest tutorial! After a three-year hiatus from certifications, I'm thrilled to announce that I've successfully obtained the AWS Certified Security Specialty certification. As someone who strongly believes in the power of community learning, I'm excited to share my journey and insights with you.

In this guide, I'll take you through my experience of preparing for and passing the AWS Certified Security Specialty exam. Rather than a comprehensive study guide, I'll present this as a collection of study notes and personal observations. My aim is to provide you with practical tips and strategies that helped me succeed.

For those seeking a more structured approach, I highly recommend the official AWS certification study guide and the excellent resources provided by TutorialsDojo. These were invaluable in my preparation and could be great resources for your own journey.

So, whether you're considering this certification or you’re just curious about AWS security, I hope you'll find value in the experiences and insights I'm about to share.


Should You Get Certified?

There are mixed opinions in the tech industry about the importance of certifications. Some people argue that the certificates you have don't matter – it's all about your real-world knowledge.

But not everyone has the chance to work with real-world projects. And certification questions are based on real-world scenarios. So if you haven't had an opportunity to work with AWS security much in practice, you can learn from this exam and apply your learnings on actual projects.

On the other hand, if you're already working with AWS, taking the exam is an excellent chance to test your knowledge and learn more about its internal workings.

For example, you might have been working with AWS for quite some time, but you haven't touched AWS security, or haven't been following best practices. The certification covers every aspect of AWS security, so you will learn how you can reduce your costs and follow best practices.


Exam Structure

It took me about 110 minutes to finish the questions, and I marked 25 for review. I then spent another 60 minutes reviewing those 25 questions.

In my case, the internet got disconnected, and my exam froze. Don't panic! Just launch the VUE software again—you are allowed to resume the exam. No snacking or restroom breaks are allowed, but you can have water.


My Study Approach

I used a structured method to prepare for the AWS Certified Security Specialty exam:

This approach helped me gain both theoretical knowledge and practical problem-solving skills essential for the exam.


Key Topics and Concepts

AWS IAM Credential Report

Understanding how to review the AWS IAM credential report is crucial. Here are some key points:

  1. Multi-Factor Authentication (MFA) Enforcement: Identify users who haven't enabled MFA and enforce its usage.
  2. Root Account Monitoring: Monitor usage of the root account to ensure it's not being used for day-to-day operations.
  3. Track user creation and last activity dates to manage user lifecycles effectively.
  4. Access Key Usage Monitoring: Identify unused access keys that could pose a security risk.
  5. Find users with old passwords or access keys that might be compromised.
  6. Understand Report Format: AWS Documentation

AWS S3 Object Lock

AWS S3 Object Lock is a feature that helps prevent objects from being deleted or overwritten for a fixed amount of time or indefinitely. It's particularly useful for scenarios requiring data immutability, such as regulatory compliance or protection against accidental or malicious deletion.

Integrating On-Premise Active Directory with IAM

It's important to know the steps involved in integrating on-premise Active Directory with IAM for single sign-on. For more details, refer to this AWS Blog Post.

AWS Service Control Policies (SCPs)

Study AWS SCP examples. Service Control Policies (SCPs) are organization-level policies that manage permissions across your AWS organization. They provide centralized control over the maximum available permissions for IAM users and roles within your organization's accounts.

For SCP examples, refer to the AWS Documentation.

Serving Private Content through CloudFront

Learn how to serve private content through CloudFront. The AWS CloudFront Developer Guide provides detailed information on this topic.

Understanding Ephemeral Ports

Understand why it's important to set the range for ephemeral ports in outbound rules. Ephemeral ports are temporary ports used in network and internet communications, managed by the machine's operating system.

Check out this Medium article (remy-nts) on NACL and ephemeral ports.

AWS/NACL : Why the need to set ephemeral ports range for outbound rules
Reminder of NACL definition:

Securing Access to Websites through CloudFront

To ensure that users can only access your website through the CloudFront URL while completely restricting access via the Application Load Balancer (ALB) URL, you’ll need to know how to do the following:

  1. Configure ALB Security Group: Restrict access to your ALB by only allowing traffic from CloudFront IP ranges.
  2. Implement Custom Headers: Set a custom header in CloudFront and configure your ALB to only accept requests with this header.

AWS KMS and Envelope Encryption

AWS KMS can directly encrypt data up to 4 KB in size. For files larger than 4 KB, you need to use Envelope Encryption. Here are the steps:

AWS KMS and Envelope Encryption
AWS KMS and Envelope Encryption

KMS Policy Conditions

Learn how conditions work in AWS KMS policy. Refer to the AWS KMS Developer Guide for detailed information.

IAM Policy Conditions

Lambda Function Assuming IAM Role in Another AWS Account

Understand how to configure a Lambda function to assume an IAM role in another AWS account. Refer to this AWS Knowledge Center article for details.

KMS Key Rotation

Understand which types of keys can be rotated automatically and which require manual rotation.

For more information, see the AWS KMS Developer Guide.

Amazon ECR Image Scanning

You can scan Amazon Elastic Container Registry (ECR) images for vulnerabilities. There are two types of scanning available in ECR:

Basic scanning offers:

Implementing End-to-End Encrypted Traffic

Know when you have a use case that requires implementing end-to-end encrypted traffic. Steps are listed below:

  1. Configure your CloudFront distribution to require HTTPS for all viewer requests.
    • Use a custom SSL/TLS certificate (from AWS Certificate Manager or imported) for CloudFront.
    • Use a third-party SSL/TLS certificate on your Application Load Balancer (ALB) or EC2 instances.
    • Ensure you use the same certificate on your EC2 instances as on your ALB for consistency.

Securely Storing RDS Credentials

Learn how to securely store RDS credentials. AWS Secrets Manager is the recommended service for storing and managing sensitive information like database credentials. It is not wise to hard-code database credentials in your code or store them in Lambda as environment variables.

CloudTrail: Data Events vs Management Events

Understand the differences between data events and management events in CloudTrail.

Management Events

Data Events

GuardDuty: Suppression Rules, Trusted IP Lists, and Threat Lists

Expect questions about suppression rules and how to add known IPs to trusted IP lists and threat lists during penetration testing.

Understand which logs are analyzed by AWS GuardDuty. These include AWS CloudTrail management event logs, VPC Flow Logs, DNS logs, EKS audit logs, S3 data events, and runtime activity from EKS, EC2, and ECS workloads.

AWS Abuse Email

Know how to respond to an AWS abuse email.

Inspector

You need to know which AWS services are scanned by AWS Inspector.

The following AWS services integrate with Amazon Inspector:

AWS Config

Learn these important AWS Config rules:

For more details, refer to the AWS Config Managed Rules documentation.

Trusted Advisor

Be aware of the checks performed by AWS Trusted Advisor:

S3 Encryption

Learn about the different use cases for S3 encryption options.

For more information, watch this video.

CloudFormation and Secrets

Using secrets in AWS CloudFormation is a great way to manage sensitive information securely. CloudFormation supports dynamic references to secrets stored in AWS Secrets Manager.

In the example below, MySecret:{{resolve:secretsmanager:SecretName:SecretKey:VersionStage:VersionId}} retrieves the 'password' field from the secret 'MySecretName' in Secrets Manager.

MySecret:
  Type: AWS::SecretsManager::Secret
  Properties:
    Name: MySecretName
    Description: "This is my secret"
    SecretString: '{"username":"myuser","password":"mypassword"}'

VPC FlowLog

Understand the use cases for using VPC flow logs.

2 123456789010 eni-1234567890abcdef0 10.0.1.5 10.0.0.220 39812 80 6 20 4249 1418530010 1418530070 ACCEPT O

Let's break down this log entry:

  1. Version number (2)
  2. AWS account ID (123456789010)
  3. Network interface ID (eni-1234567890abcdef0)
  4. Source IP address (10.0.1.5)
  5. Destination IP address (10.0.0.220)
  6. Source port (39812)
  7. Destination port (80)
  8. Protocol (6 = TCP)
  9. Packets transferred (20)
  10. Bytes transferred (4249)
  11. Start time (1418530010)
  12. End time (1418530070)
  13. Action (ACCEPT)
  14. Log status (0)

S3 Glacier Vault Lock Policies and Archival Retrieval Options

S3 Glacier Vault Lock policies are a powerful feature for enforcing compliance controls on your Amazon S3 Glacier vaults. These policies allow you to create and lock down rules that control access to your archives, ensuring that your data retention and deletion policies are strictly enforced.

When initiating a job to retrieve an archive, you can specify one of the following retrieval options, based on your access time and cost requirements.

RDS Copying Encrypted Snapshots

WAF Protections

Understand which layer AWS WAF operates on. AWS WAF (Web Application Firewall) mainly works at the application layer (Layer 7) of the OSI (Open Systems Interconnection) model.

AWS Config Aggregator

You can expect questions about AWS Config Aggregator. This feature lets you gather configuration and compliance data from multiple accounts and regions into one account, giving you a complete view of your AWS resources.

For more information, refer to the AWS Config Aggregator documentation.

AWS Macie

Learn how to categorize your data using Amazon Macie.

AWS CloudFront OAI

Learn how to restrict user access to content directly from S3. To limit user access to content directly from S3 when using Amazon CloudFront, you can use Origin Access Identity (OAI). An OAI is a special CloudFront user that lets you restrict access to your S3 bucket content. When you create an OAI, CloudFront connects it to your distribution, and you can configure your S3 bucket to only allow access from that OAI.

AWS CloudHSM

Use AWS CloudHSM instead of KMS when you want complete control over key management hardware and keys.

AWS CloudHSM lets you manage and use your keys on FIPS-approved hardware. It uses customer-owned, single-tenant HSM instances that operate in your own Virtual Private Cloud (VPC). If you need full control over the Hardware Security Module (HSM) that stores and manages your cryptographic keys, CloudHSM is the better choice.

AWS KMS Key Types

Learn about the available KMS key types:

  1. Symmetric Keys
    • AWS Managed Keys
    • Customer Managed Keys
  2. Asymmetric Keys: These consist of a public and private key pair.
  3. HMAC Keys: Used for generating and verifying Hash-based Message Authentication.
  4. Multi-Region Keys: A set of interoperable keys that can be replicated across multiple AWS Regions. These are useful for encrypting data across multiple Regions or for disaster recovery scenarios.
  5. Keys with Imported Key Material: Allows you to import your own key material into KMS.
  6. Keys in Custom Key Stores: Enables you to create and manage KMS keys in an AWS CloudHSM cluster.

A Few Notes on AWS CloudTrail

  1. Enable CloudTrail in all regions: To ensure thorough logging, activate CloudTrail in every AWS region. This gives you a complete record of activities across your entire AWS infrastructure.
  2. Use a dedicated S3 bucket: Store CloudTrail logs in a specific S3 bucket with strict access controls. This helps prevent unauthorized access and ensures the integrity of your audit logs.
  3. Enable log file integrity validation: This feature uses industry-standard algorithms to ensure that your log files haven't been tampered with after delivery to S3.
  4. Encrypt log files: Use server-side encryption with AWS KMS managed keys (SSE-KMS) to secure your CloudTrail log files while they are stored. This provides an additional layer of security for your audit data.
  5. For the S3 bucket that stores CloudTrail logs, enable Multi-Factor Authentication (MFA) Delete. This helps prevent unauthorized deletion of log files.
  6. Use AWS Config rules to make sure CloudTrail is always turned on and set up correctly across all your accounts.
  7. Regularly review and analyze your CloudTrail logs. Consider using AWS services like Amazon Athena or third-party SIEM tools for log analysis.
  8. If you're using AWS Organizations, consider setting up organization-wide trails to centralize logging for all accounts in your organization.

S3 Replication

Learn how to replicate encrypted S3 objects across regions.

AWS Service Catalog

Learn about the use cases for AWS Service Catalog.

You can use AWS Service Catalog to standardize your applications and distribute them to your teams. For example, if you want to set restrictions on encryption and AMIs, you can create a complete application stack and share it with your team.

MFA for Active Directory Users

You can enable multi-factor authentication (MFA) for your AWS Managed Microsoft AD directory to increase security when your users specify their AD credentials to access supported Amazon Enterprise applications.

When you enable MFA, your users enter their username and password (first factor) as usual, and they must also enter an authentication code (the second factor) they obtain from your virtual or hardware MFA solution.

AWS IAM Access Analyzer


Conclusion

Getting the AWS Certified Security Specialty certification was a great experience that helped me learn more about AWS security. By studying and applying what I learned, I gained useful knowledge about keeping AWS environments secure.

This certification proved my skills and gave me the tools to use best practices in real situations. Whether you're new to AWS security or want to improve your skills, going for this certification can be an important part of your career growth.

I hope my experiences encourage and help you on your certification path. Keep in mind that ongoing learning and being active in the community are important to stay updated in the fast-changing world of cloud security.

AWS Security Specialty Certification: How to Prepare for the Exam

Welcome to my latest tutorial! After a three-year hiatus from certifications, I'm thrilled to announce that I've successfully obtained the AWS Certified Security Specialty certification. As someone who strongly believes in the power of community lear...