Strategic Implementation of AWS Security Services: A Focus on Best Practices, SSM and Secrets Manager

Authors

  • Balasubrahmanya Balakrishna

DOI:

https://doi.org/10.47941/jts.1659

Keywords:

AWS, SSM, AWS Secret Manager, Data Security, KMS Secrets Encryption , Decryption

Abstract

Purpose: As organizations increasingly migrate to the cloud, ensuring robust data security becomes paramount. This technical paper explores the purpose, methodology, findings, and unique contributions in cloud security, focusing on AWS Systems Manager (SSM) and Secrets Manager. The objective is to provide a comprehensive guide for engineers and architects seeking to enhance data security in their cloud environments.

Methodology: The comparative study conducted involves analyzing the features, capabilities, and integration possibilities of AWS SSM and Secrets Manager. Real-world use cases, best practices, and security measures associated with these services are explored through a methodology that includes hands-on exploration, case studies, and a survey of existing literature to distill critical insights.

Findings: The paper uncovers a rich landscape of security measures facilitated by AWS SSM and Secrets Manager. Findings highlight the strengths and limitations of each service, emphasizing the importance of their integration for a holistic security approach. Automated rotation of credentials, encryption options, IAM policies, and monitoring strategies emerge as critical findings, contributing to the overall understanding of secure cloud data management.

Unique contributor to theory, policy, and practice: This work uniquely provides a detailed comparative analysis that empowers engineers and architects to make well-informed decisions. The paper offers insights into the nuances of AWS SSM and Secrets Manager, enabling professionals to tailor their security strategies based on specific use cases and requirements. The focus on real-world scenarios and identifying best practices make this contribution practical and applicable, serving as a valuable resource for those navigating the complex landscape of cloud security engineering and architecture.

Downloads

Download data is not yet available.

References

AWS (2022, May 8). Securely retrieving secrets with AWS Lambda. AWS Compute Blog. https://aws.amazon.com/blogs/compute/securely-retrieving-secrets-with-aws-lambda/

AWS (n.d.). Parameters. AWS Powertools for AWS Lambda (Python). https://docs.powertools.aws.dev/lambda/python/latest/utilities/parameters/

AWS (n.d.). AWS Secrets Manager Pricing. AWS Secrets Manager. https://aws.amazon.com/secrets-manager/pricing/

AWS (n.d.). Parameter Store. AWS Systems Manager Pricing. https://aws.amazon.com/systems-manager/pricing/

AWS (2022, November 11). AWS Secrets Manager increases the API Requests per Second limits. What's New With AWS? https://aws.amazon.com/about-aws/whats-new/2023/07/awssystems-manager-parameter-store-api-limit/

AWS (n.d.). AWS Secrets Manager quotas. AWS Secrets Manager. https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html

Downloads

Published

2024-02-05

How to Cite

Balakrishna, B. (2024). Strategic Implementation of AWS Security Services: A Focus on Best Practices, SSM and Secrets Manager. Journal of Technology and Systems, 6(1), 25–35. https://doi.org/10.47941/jts.1659

Issue

Section

Articles