In the previous block, we have people have discussed regarding the AWS Volumes. And these volumes contain some information. This Volume contains both the general as well as the confidential information. Since Amazon is a cloud platform many people approach this vendor to use the resources. So it means this Vendor has several clients. And every client comes with their own agenda. Besides some clients have a good agenda like increasing their business. But on the other side, some other people interests in stealing the other client's data in the network. So in such cases, we need to protect our confidential information. So this platform offers security groups to provide security to the user data. And today in this block we will discuss the security groups in this platform
What is an AWS Security group?
A security group is a virtual firewall responsible for controlling the traffic to your EC2 instances. A security group is the first defense against hackers. Whenever you launch an AWS instance, you can associate with one (or) more security groups.
Features of AWS Security Group :
This security group has some features. Let us discuss them in detailed
- By default, the security group allows all the outbound traffic
- Security groups were always permissive. And by default, you cannot create the rules that deny the access
- Security groups were stateful. It means if you send a request from an instance, the responsive traffic for that traffic is allowed to flow regardless of inbound security group rules.
- This platform allows users to add/ remove rules at any time. And this platform allows automatically applies the changes to the respective instances in the security group
- When you associate multiple security groups with an instance, each security group are effectively aggregated to create one set of rules. And these rules determine the access permission to the users
If there is more than one rule for the specific port we apply the most permissive rule.
Also, check the latest trends in AWS Firewall manager
The Security group use connection tracking to track the information about the traffic to and from the instance. Rules were applied based on the connection state of the traffic to determine if the traffic is allowed (or) denied. It allows security groups to be stateful. Regardless of the security groups rules, these platforms allow the responses to the inbound traffic
Default Security Groups:
This platform automatically offers the default security group for the default VPC in each region. If you don't specify the security group when you launch the instance, the instance is automatically associated with the default security group for the VPC. The default security group is named default and contains an ID assigned by AWS platformDefault rules:
- For the instances that are associated with this group, the default security group allows all the inbound traffic. Besides it also allows all the outbound traffic from the instance. Besides you can add (or) remove inbound and outbound rules to any default security group.
Custom Security Groups:
There are some situations , where the users would not like to use the default security. So this platform allows the users to create their own security groups and allows the users to specify them when you launch the instance. Besides this platform allows you to create multiple security groups to reflect the different roles that your instances play. So whenever you create the security group you must provide the name as well as the description. These group names and descriptions can be up to 255 characters in length. And these security group allows the no inbound traffic. Besides, it allows all the outbound traffic
So now we will see how to create the security group practically
step - 1 :
Login to your AWS Console and click on Security Groups
step - 2 :
Click on Create Security Group
step - 3 :
Provide the security group name, description, as well as the, provide protocol rules in the security group. And then finally click on create on Create
And the people can use this security group while launching an instance. But this platform allows the users to create only 5 security groups per elastic network interface. And the users can use this security interface while launching an instance.