Allowed AMIs in Amazon EC2 (Part 2)
Allowed AMIs operations
The Allowed AMIs feature offers three operational modes for overseeing the image criteria: enabled, disabled, and audit mode. These modes allow you to activate or deactivate the image criteria, or examine them when necessary.
Enabled
When Allowed AMIs is enabled:
- The ImageCriteria are applied.
- Only allowed AMIs are discoverable in the EC2 console and by APIs that use images
- Instances can only be launched using allowed AMIs.
Disabled
When Allowed AMIs is disabled:
- The ImageCriteria are not applied.
- No restrictions are placed on AMI discoverability or usage.
Audit mode
In audit mode:
- The ImageCriteria are applied, but no restrictions are placed on AMI discoverability or usage.
- In the EC2 console, for each AMI, the Allowed image field displays either Yes or No to indicate whether the AMI will be discoverable and available to users in the account when Allowed AMIs is enabled.
- In the command line, the response for the describe-image operation includes "ImageAllowed": true or "ImageAllowed": false to indicate whether the AMI will be discoverable and available to users in the account when Allowed AMIs is enabled.
- In the EC2 console, the AMI Catalog displays Not allowed next to AMIs that won't be discoverable or available to users in the account when Allowed AMIs is enabled.
Best practices for implementing Allowed AMIs
- Enable audit mode- Start by activating Allowed AMIs in audit mode. This setting lets you observe which AMIs would be impacted by your criteria without enforcing any access restrictions, allowing for a risk-free assessment timeframe.
- Set Allowed AMIs criteria- Carefully establish which AMI providers align with your organization's security policies, compliance requirements, and operational needs.
- Check for impact on expected business processes- You can utilize the console or the CLI to locate any instances that were initiated with AMIs that don't comply with the defined standards. This insight can help you decide whether to modify your launch configurations to employ compliant AMIs or to change your criteria to accept these AMIs.
- Enable Allowed AMIs- After verifying that the criteria will not negatively impact anticipated business processes, proceed to enable Allowed AMIs.
- Monitor instance launches- Keep an eye on instance launches from AMIs throughout your applications and the AWS managed services in use, including Amazon EMR, Amazon ECR, Amazon EKS, and AWS Elastic Beanstalk. Look for any unanticipated problems and make adjustments to the Allowed AMIs criteria as needed.
- Pilot new AMIs- To test third-party AMIs that do not comply with your current Allowed AMIs settings, AWS recommends the following approaches:
- Use a separate AWS account: Create an account with no access to your business-critical resources. Ensure that the Allowed AMIs setting is not enabled in this account, or that the AMIs you want to test are explicitly allowed, so that you can test them.
- Test in another AWS Region: Use a Region where the third-party AMIs are available, but where you have not yet enabled the Allowed AMIs settings.
These approaches help ensure your business-critical resources remain secure while you test new AMIs.
Conclusion
Other aspects of Allowed AMIs operations are discussed in detail.
Comments
Post a Comment