The primary place for this is a little green table on the ASD site that looks like this:
AWS had previously announced on 28 March 2018 that public sector companies could self-assess AWS to PROTECTED level workloads; now that self assessment is no longer necessary. However a guide does exist (as noted by the asterisk in the above table) that there are conditions on doing this.
That guide is available to AWS customers via the NDA-enforcement system of AWS Artefact. The guide shows how to meet the PROTECTED level, and it should come as no surprise that using strong, managed encryption is a key part of this (pun intended).
There’s other reasons for Australian customers to look in at Artefact, such as agreements around compulsory breach notification, etc. These are specific to regulatory requirements in Australia.
So what services changed to reach PROTECTED
From what I can tell (and its been 4 years since I worked at AWS), none. The guidance that recommends using strong encryption (Key Management Service) appears to be dates some time in the past. With 42 services in scope for PROTECTED, its a big step up from the previous 6 or so that were covered under self-assessment.
A complete matrix of services in scope can be seen here.
It’s interesting to see just 4 services that have now got UNCLASSIFIED rating that are not also available under PROTECTED: Route53, Organi[sz]ations, Shield, and Trusted Advisor. If you were using DNS for storing PROTECTED data you’ve probably got something wrong with you, to be honest; while Organi[sz]ations and trusted Advisor don’t store your information — they configure other services and give you operational recommendations respectively.
UNCLASSIFIED goes world-wide
One thing that I hadn’t noticed, by was told, was that unclassified workloads could now be run in any of the AWS Commercial Regions (i.e., except China). I couldn’t find a reference to this, but it’s worth asking your local AWS team about for your workload.
This would mean that those workloads that were previously running in the Cloud that were not rated PROTECTED can now look again at things like S3 inter-region replication, multi-Region redundancy, and more. Things like VPC Peering between Regions for distributed fault-tolerance make this just as trival for VM-based services to communicate across the world.
This is particularly attractive for services that are only available in, for example, US-East-1, or where costs are cheaper (e.g., Storage).
My Favourite service for Protected workloads
So back to the long list of protected services, what’s my favourite top 10 items to choose from:
- CloudTrail (but my preference is an Organisation CloudTrail these days)
- VPC, EC2, EBS, RDS, ELB (ok, thats 5, but they’re so tightly interrelated)
- CloudWatch & CloudWatch Logs
- CloudFront & Lambda@Edge
So why this lot? Well, I think with just this combination I can probably solve around 95% of all workloads, reducing the TCO and increasing reliability and security posture at the same time.
So the time has come. If you’re in the IT department of any public sector, at Local, State or Federal, you should already be working this out.
If you can’t figure this out, reach out. If you’re needing training, check out Nephology’s Advanced Security & Operations on AWS in person training course, available throughout Australia (just ask). We’ve had over 10 years continuous production use of AWS, with critical workloads.