Security - eBook (EN)

Securing your AWS Cloud environment from ransomware

Issue link: https://read.uberflip.com/i/1472542

Contents of this Issue

Navigation

Page 1 of 18

Notices This document is provided for informational purposes only. It represents the current product offerings and practices from Amazon Web Services (AWS) as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information in this document and any use of AWS products or services, each of which is provided "as is" without warranty of any kind, whether express or implied. This document does not create any warranties, representations, contractual commitments, conditions, or assurances from AWS, its affiliates, suppliers, or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. Table of contents Ransomware: A formidable threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 AWS is purpose-built for security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Before ransomware strikes: Network hardening and prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 During an incident: Early detection and automated responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Recovering from ransomware: Root cause and lessons learned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2

Articles in this issue

view archives of Security - eBook (EN) - Securing your AWS Cloud environment from ransomware