Monday, 5 October 2020

A few key principles to secure your AWS environment

A lot of companies are migrating their workflows to the cloud services like AWS, Azure or GCP. Although cloud environments add a lot of value and could be great for both operation and security, but not having the right controls in place could be risky. 

We have seen lost of data breaches as a result of bad configuration on AWS. When using AWS environment, there are a lot of considerations to keep in mind depending on the use cases, but there are a few fundamental controls that are needed to ensure basic security levels are applied. Just following these principles and guidelines will reduce the risks associated with AWS environments substantially.

1- Account-level Access Controls: Ensure you provide least privilege access to those who need to access AWS accounts.

2- Resource-level Access Controls: Ensure you have proper IAM policies to restrict access to and from resources to what is needed only. For example, if you are setting up a S3 storage to be used with an EC2 host, the policy should limit accessing S3 storage from anything but that EC2 host.

3- Default encryption: Encrypt everything where possible. All resources like S3, EBS, RDS, etc. must be encrypted. Also use encrypted services and integrations, e.g. https, ssh, etc.

4- Utilize security groups and access lists to minimize accessing to the resources to what is needed only.

5- Increase monitoring controls via logs, and AWS security services like Guardduty and Inspector.

6- Don't forget about standard security controls like malware protection, WAF, vulnerability management, etc.



Sunday, 15 March 2020

Analyse Vigenère Cipher cryptosystem by using figures and mathematical formula, example


Vigenère Cipher


Below we explain Vigenère Cipher which is a Symmetric cryptosystem. We have a table including 26 characters of alphabet each associated with a number from 0 to 25.




Message (Plain-Text) we are trying to encrypt is: “Network Security”
Encryption Key that we will use for this is: “ITC”
First, we find the Numbers for the key work on the table”
ITC = 8, 19, 2

Now we need to repeat the keyword to be the same size as message text. Once that’s done, next step is to shift each character to the right based on associated key number. For example, if the character is “N”, and associated Key character is “I”, then we shift “N” on the above table, 8 cells to the right and that makes it “V”.
Note: If we reach end of the table, we go back and start from the left side.

We will do this for all message text characters in the below table:





So, as it can be seen on the above table, the output Cipher-Text would be: “VXVDGTS KGKMTQLA”