We commonly heard about this in our interactions with customers. The snapshots are stored in Amazon S3, but they cannot be fetched or used like typical S3 objects. If your company has ever taken an Amazon Machine Image (AMI) of a server in AWS, that would have generated a collection of snapshots. Prior to the release of EBS direct APIs, EBS snapshots were incremental, point-in-time backups of volumes (similar to hard drives). Because of the importance of these APIs and their impact on the security world, we have also created tools, provided at the end of this blog, to assist others in utilizing EBS direct APIs’ security potential. In this blog, we will examine how EBS direct APIs could potentially be used defensively and for analysis within DFIR matters, as well as cover additional security considerations.Īs we mentioned, supporting tools to use EBS direct APIs are just beginning to be released by AWS, and as such, do not cover the wide range of applications we will be discussing in this blog. Generally, with large-scale innovation come people who will try to optimize, compromise or defend with it. In relation to the work of Crypsis (a Palo Alto Networks company that provides cybersecurity professional services including digital forensics and incident response (DFIR), offensive security and proactive work), EBS direct APIs could be used to interact with AWS in ways not previously seen. Discussions around the APIs’ applications have appeared scarce since then, but according to a blog published at the time of their release, “ Programmatic Access to EBS Snapshot Content,” “These APIs are designed for developers of backup/recovery, disaster recovery, and data management products and services, and will allow them to make their offerings faster and more cost-effective.”īut this release of EBS direct APIs is not limited to potential DR applications. Notably, disaster recovery software provider Veeam integrated this new API into its technology in July. AWS is actively releasing supporting tools on GitHub for customers. Tools to take advantage of these APIs are evolving quickly. These APIs now allow disaster recovery companies to do so. The most efficient way to do this is to copy the data directly from AWS and only copy the data that’s changed over time. These new APIs have been helpful in disaster recovery (DR) scenarios: In the event of an AWS regional outage or outage of a specific customer’s AWS environment, disaster recovery companies need access to data in order to restore company operations. For purposes of automation and integration into build tools and CI/CD pipelines, this list is also available as a CSV (opens new window) file.In December 2019, Amazon Web Services (AWS) announced the availability of Amazon Elastic Block Store (EBS) direct APIs, giving AWS customers granular (block-level) access to snapshots (incremental backups), which were once considered a fairly opaque EBS format. Below is a complete list of currently published AMIs and their corresponding IDs. The AlmaLinux OS Foundation's official AlmaLinux OS images (opens new window) are available via the AWS Marketplace at the links provided: AlmaLinux OS 8Ĭommunity AMIs are images that are shared directly by the AlmaLinux OS Foundation for others to utilize directly within their infrastructure. ![]() All AWS Marketplace products undergo thorough review and vetting by the AWS team to ensure security and quality. The AWS Marketplace is a curated digital catalog used to find, deploy and manage software offerings. You can also discuss on our Cloud SIG Forum (opens new window) and on our AlmaLinux Community Reddit (opens new window). Join our Cloud SIG on Mattermost (opens new window) to help out with the effort or for support. You can find more information about how these, and other cloud images are built on our Cloud Images GitHub Repository (opens new window). There are currently 2 deployment channels available: Marketplace and Community. To learn more about AWS AMIs please see the AWS EC2 Documentation on AMIs (opens new window).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |