Infrastructure Security in AWS Elastic Disaster Recovery
Visit this link to discover how AWS Elastic Disaster Recovery safeguards your infrastructure. You'll find a wealth of resources designed to help you get the most out of this managed service.
What security measures are in place for AWS Elastic Disaster Recovery?
AWS Elastic Disaster Recovery is safeguarded by the AWS global network security procedures outlined in the Amazon Web Services: Overview of Security Processes whitepaper. It employs Transport Layer Security (TLS) 1.2 or later for communication, ensuring that all parties authenticate each other using TLS, IAM policies, and tokens.
How should I manage access keys for AWS Elastic Disaster Recovery?
Customers of AWS Elastic Disaster Recovery should manually delete their access keys after installing the AWS Replication Agent and completing a successful recovery. AWS does not automatically delete these keys. For added security, you can set up IAM permissions to automatically disable keys after a specified date.
What practices should I follow to secure replication servers?
To enhance the security of replication servers, AWS Elastic Disaster Recovery customers should limit exposure by using Security Groups to permit only specific IP addresses and consider establishing a VPN connection to the replication servers. Additionally, access to the AWS Elastic Disaster Recovery Failback Client should be restricted to trusted administrators.

Infrastructure Security in AWS Elastic Disaster Recovery
published by Brick Bridge Consulting
Brick Bridge Consulting is a technology consulting and implementation firm providing boutique designs and software development to Executives and IT Managers seeking to improve their users’, and their own, experience.