While many companies host their Windows and Linux distributions, such as Red Hat, servers in Amazon Web Services (AWS), more and more companies are starting to stand up and run the Amazon version of Linux, called the Amazon Linux Amazon Machine Image (AMI). This flavor of Linux is provided by AWS for use on Amazon Elastic Compute Cloud (Amazon EC2) and even virtualized and local environments.
It was designed by Amazon to provide optimized machines for applications running on Amazon EC2. It’s based on Red Hat Enterprise Linux (RHEL) and also similar to CentOS, which is Red Hat’s free server distribution of Linux.
AWS currently owns 33% of the cloud infrastructure services market share and has numerous Fortune 100 customers, including Expedia, Boeing, and Intuit. Customers like these have multiple operating systems (OS) for various purposes, such as Windows, RHEL, Ubuntu, and of course, Amazon Linux. The reason why they’re using Amazon Linux is because of the many technical benefits that Amazon has written into this distribution.
Despite Linux being an inherently more secure OS and AWS securing their cloud, customers still need to understand that they need to secure their Amazon Linux AMIs.
Many people assume that once they host their images in AWS, they’re totally protected. They are quite well-protected in many respects due to the security that AWS implements for their infrastructure.
They follow compliance, implement firewalls, and encrypt data in transit, just to name a few of the safeguards put into place. But at the end of the day, what they’ve done is secure the parking lot and traffic, but not the vehicle itself because what the AWS cloud is doing is holding your images.
“Ok, but securing the OS is really a Windows problem, not a Linux problem,” is what some people say. It (Read more...)
*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Josh Fu and Richard Robitaille-Muffler. Read the original post at: https://threatvector.cylance.com/en_us/home/amazon-linux-is-amazing-but-still-needs-protecting.html