Security Principles
The GovTech Multicloud Platform implements a defense-in-depth security strategy with multiple layers of protection:Least Privilege
Every user and service receives only the permissions necessary for their specific function
Zero Trust Network
All network communication is explicitly allowed; default deny for all traffic
Encryption Everywhere
Data encrypted at rest and in transit using AWS KMS and TLS 1.3
Continuous Monitoring
24/7 threat detection with CloudTrail, GuardDuty, and Security Hub
Security Layers
Our security architecture consists of five critical layers:1. Identity and Access Management (IAM)
Three-tier functional hierarchy based on risk level:- Level 1 - Critical: Network Admin, EKS Admin, Database Admin, Terraform Operator
- Level 2 - Operational: Container Deploy, ALB Operator, CI/CD Operator
- Level 3 - Read Only: Secrets Read, Monitor, Security Auditor
All Level 1 (Critical) access requires:
- Hardware MFA (YubiKey recommended)
- Approval from a second responsible party
- Time-limited sessions (maximum 8 hours)
- Immediate CloudWatch alerts on all actions
2. Network Security
Zero Trust Networking with Kubernetes NetworkPolicies:- Frontend can only communicate with Backend
- Backend can only communicate with Database and AWS APIs (port 443)
- Database cannot initiate any outbound connections
- Default deny all traffic policy
3. Encryption & Key Management
AWS KMS (Key Management Service) provides centralized encryption:- RDS Databases: Encrypted at rest with KMS
- S3 Buckets: Server-side encryption (SSE-KMS)
- EBS Volumes: Encrypted volumes for Kubernetes PVCs
- Secrets Manager: All secrets encrypted with KMS
- CloudTrail Logs: Encrypted audit logs
- Automatic Key Rotation: Annual rotation enabled
4. Threat Detection
Three-layer monitoring system:CloudTrail - Audit Logging
Records every API call made in the AWS account:
- Who performed the action
- When it occurred
- Source IP address
- Success or failure
GuardDuty - Threat Detection
AI-powered intrusion detection analyzing:
- VPC Flow Logs for suspicious network traffic
- CloudTrail for unusual API activity
- DNS logs for communication with malicious domains
- EKS audit logs for Kubernetes threats
5. Application Protection
AWS WAF (Web Application Firewall) protects the application from:- SQL injection attacks
- Cross-site scripting (XSS)
- Known malicious inputs (Log4Shell, SSRF)
- Botnet and Tor exit node traffic
- Rate limiting (2000 requests per IP per 5 minutes)
Compliance Frameworks
The platform is designed to meet government security requirements:CIS AWS Foundations Benchmark v1.4.0
CIS AWS Foundations Benchmark v1.4.0
Automated compliance checking for:
- IAM password policies
- MFA enforcement
- Root account security
- VPC security group rules
- S3 bucket public access
- CloudTrail configuration
AWS Foundational Security Best Practices
AWS Foundational Security Best Practices
Continuous monitoring of:
- Encryption at rest and in transit
- Least privilege access
- Network segmentation
- Logging and monitoring
- Incident response readiness
FISMA / FedRAMP Ready
FISMA / FedRAMP Ready
Government-grade security controls:
- Multi-factor authentication
- Audit trail retention (365 days in production)
- Encryption key management
- Access control separation
- Continuous monitoring
Security Incident Response
Alert Levels
| Severity | Trigger | Response Time | Action |
|---|---|---|---|
| Critical | Root account usage, unauthorized API calls | Immediate | Alert DevOps team, investigate within 15 minutes |
| High | GuardDuty finding, suspicious network activity | 1 hour | Review logs, assess impact, contain threat |
| Medium | Cost anomaly, unusual deployment | 4 hours | Investigate source, validate legitimacy |
| Low | Security Hub compliance drift | 24 hours | Review configuration, plan remediation |
Automated Responses
Security Best Practices
For Developers
For DevOps Engineers
- Always use MFA for AWS console and CLI access
- Rotate access keys every 90 days (preferably use temporary credentials)
- Review CloudTrail logs weekly for unusual activity
- Test Network Policies before deploying to production
- Scan container images for vulnerabilities before pushing to ECR
For Security Auditors
- Weekly Checks
- Monthly Audit
- Quarterly Review
- Review GuardDuty findings
- Check for users without MFA
- Verify no public S3 buckets
- Confirm CloudTrail is enabled
Quick Verification Commands
Next Steps
IAM Policies
Explore detailed IAM groups, roles, and permissions
Network Policies
Understand Kubernetes network segmentation
Secrets Management
Learn how to securely manage credentials
Compliance
Review audit procedures and compliance reports