The post describes how to build a secure PostgreSQL RDS instance with AWS CDK. The AWS CDK constructs can create RDS instance, VPC, NAT gateway or instance, IAM roles, and others with a few lines of code. The post specifically discusses encryption at rest, how to log queries to CloudWatch, setting up a bastion host, and NLB. Performance Insights is also briefly mentioned as a tool to find bad queries that could be anomalous in nature and origin. Finally, the post suggests that while this guide is not comprehensive, it does provide an excellent framework for constructing secure infrastructure in AWS.
Examples of creating secure infrastructure on AWS are discussed, starting with PostgreSQL on AWS RDS. AWS comprehensive services were explained, and all possible security features added based on ten years of AWS expertise. Several examples in the article were discussed, including networking, databases, security groups, and VPC endpoint configurations.
The RDS instance was assumed to have secure credentials and encrypted storage at rest, with the root user password rotated daily. Additionally, the log queries are stored in CloudWatch, and Performance Insights can be enabled to detect bad queries. To achieve an additional layer of security, it is suggested to use more advanced security tools, like CloudTrail and S3 IAM roles.
The article describes how an RDS instance with two modes of access (NLB and bastion host) was created. The bastion host functions as a tunnel so people can run queries. The NLB is configured to allow specific public IP addresses and connect to the RDS instance.
The post explains how to use the Core Cloud Development Kit to create an RDS instance on AWS. A VPC with two public and two private subnets was also created, with flow logs sent to CloudWatch.
The article explains how to set up the security group, which specifies who and how to access the RDS instance. In conclusion, the post provides an excellent guide to creating a secured RDS instance on AWS with CDK.
In the post, the CloudWatch tool in AWS is used to monitor traffic in the VPC, making it possible to monitor and alarm the system when there are potential problems or security breaches.
The article points out that AWS CDK constructs could create essential components for security, including RDS instances, VPCs, NAT devices, security groups, and IAM roles, among others. However, while the guide is not entirely comprehensive, it presents an excellent framework for handling secure infrastructure in AWS.
The post shows the Core Cloud Development Kit (CDK) in action. The kit provides a way of defining cloud resources using familiar programming languages such as TypeScript, JavaScript, Python, Java, and .Net. Writing CDs using the CDK construct is straightforward since the number of configuration files required for defining AWS cloud resources is significantly reduced.
The article explains in detail how to create a bastion host, which functions as a VPN gateway, allowing clients to connect securely to the RDS instance via a specified IP address.
The post also suggests that Performance Insights, although it may not be strictly related to security, is useful in finding bad queries via this feature, which could be anomalous in nature and origin, and it makes these logs encrypted at rest.