Securing Amazon Web Services with Zero Trust Architecture
| dc.contributor | Aalto-yliopisto | fi |
| dc.contributor | Aalto University | en |
| dc.contributor.advisor | Lund, Thomas | |
| dc.contributor.author | Jaiswal, Shweta | |
| dc.contributor.school | Perustieteiden korkeakoulu | fi |
| dc.contributor.supervisor | Jiang, Yuming | |
| dc.date.accessioned | 2025-01-12T17:30:53Z | |
| dc.date.available | 2025-01-12T17:30:53Z | |
| dc.date.issued | 2024-07-31 | |
| dc.description.abstract | Securing cloud infrastructure has become a crucial priority for organizations worldwide in the rapidly evolving technological landscape. As businesses increasingly depend on cloud-based systems, safeguarding sensitive information against potential threats is essential. AWS is one of the public cloud providers offering various services for organizations. Despite its widespread adoption, AWS faces significant security challenges, evidenced by notable breaches such as the Capital One and Imperva incidents. These breaches underscore the need for proactive security measures to address the security challenges in AWS. Traditional security models, such as perimeter-based or trust-based, are insufficient for protecting AWS environments due to the dynamic nature of cloud resources and the porous network perimeters. ZTA provides a more robust approach by operating under the assumption that threats can originate inside and outside the network. It advocates for granular access controls, micro-segmentation, and continuous authentication and authorization to minimize the attack surface and prevent lateral movement within the network. This thesis focuses on enhancing the security of AWS using ZTA. It comprehensively reviews the state-of-the-art techniques for implementing ZTA tenets and addresses AWS security challenges. It offers insights and solutions to enhance AWS security through the adoption of ZTA principles. Furthermore, it presents a Proof-of-Concept (POC) implementation of a ZTA system to securely manage AWS resources. The POC implementation was conducted in collaboration with Sikt - The Norwegian Infrastructure Provider for Research and Education. | en |
| dc.format.extent | 92 | |
| dc.format.mimetype | application/pdf | en |
| dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/132846 | |
| dc.identifier.urn | URN:NBN:fi:aalto-202501121141 | |
| dc.language.iso | en | en |
| dc.programme | Master’s Programme in Security and Cloud Computing (SECCLO) | fi |
| dc.programme.major | Security and Cloud Computing | fi |
| dc.programme.mcode | SCI3113 | fi |
| dc.subject.keyword | Zero Trust architecure | en |
| dc.subject.keyword | Amazon Web Services Security | en |
| dc.subject.keyword | cloud security | en |
| dc.subject.keyword | ZTA implementation | en |
| dc.subject.keyword | ZTA challenges | en |
| dc.title | Securing Amazon Web Services with Zero Trust Architecture | en |
| dc.type | G2 Pro gradu, diplomityö | fi |
| dc.type.ontasot | Master's thesis | en |
| dc.type.ontasot | Diplomityö | fi |
| local.aalto.electroniconly | yes | |
| local.aalto.openaccess | yes |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- master_Jaiswal_Shweta_2024.pdf
- Size:
- 2.36 MB
- Format:
- Adobe Portable Document Format