Automated remediation level 4: Actual automation

Automated remediation level 4: Actual automation

Let’s get to automatically remediating already!

This entry will be the last in our series based on The 4 Levels of Automated Remediation. After the previous 3 steps—where we discussed everything from logging to best practices to account hygiene—it’s time to talk about the actions that really let you calibrate and control the kind of remediation you’re looking to get out of the process. We’ll once again use AWS as our case study and jumping-off point for keeping your cloud environments clean and (as) free (as possible) of misconfigurations at this “classic” level of automated remediation.

Key off on APIs

Deactivate them. If they’re old, that is. Since API keys essentially authenticate traffic for 2 things that really need to talk to each other, it’s a good rule of thumb to regularly and continually “rotate” your API keys so that anyone—or anything—with malicious intent is kept guessing. This is probably the most obvious hygiene action we’ll discuss here. The AWS Secrets Manager platform enables:

Creation and protection of “secrets” that manage API keysRotation of API keysAuditing of credential rotation for your cloud resourcesScheduled/automatic rotation of keys, aka secrets

Delete the nondescriptors

Those newly provisioned Security Group (SG) rules may not have a description. Why would that be? When found, it doesn’t really matter. They’re liabilities and they should be deleted. SG rules allow you to really get into the fine-grained nitty gritty of control over the traffic moving in and out of instances on your cloud infrastructure.

If an SG rule is indeed newly provisioned and lacks a descriptor, odds are it isn’t a priori ..

Support the originator by clicking the read the rest link below.