Difference between revisions of "Securing OpenEMR - AWS"

From OpenEMR Project Wiki
Line 13: Line 13:
* This is a guide for securing your domain if you registered it via AWS's Route53. If you did not, some of the concepts still apply and you are encouraged to implement where ever your domain is registered.
* This is a guide for securing your domain if you registered it via AWS's Route53. If you did not, some of the concepts still apply and you are encouraged to implement where ever your domain is registered.
* There are 3 important records for securing a domain: SPF, DKIM, and DMARC.  
* There are 3 important records for securing a domain: SPF, DKIM, and DMARC.  
 
[[User:Daniel Ehrlich|Daniel Ehrlich]]
----
 
* The most important is SPF. To implement SPF:
* The most important is SPF. To implement SPF:
** xyz, xyz xyz
** xyz, xyz xyz

Revision as of 21:39, 14 November 2018

Background

Account

  • Setting up 2FA
    • AWS provides excellent instructions for setting up 2FA here.
    • This will require you to enter a code from an app on your phone after inputting your password. Apps such as Duo or Google Authenticator are recommended for generating the code.
  • Billing Estimates
  • Other Account Tasks

Secure Your Domain (Optional - Route53)

  • This is a guide for securing your domain if you registered it via AWS's Route53. If you did not, some of the concepts still apply and you are encouraged to implement where ever your domain is registered.
  • There are 3 important records for securing a domain: SPF, DKIM, and DMARC.

Daniel Ehrlich

  • The most important is SPF. To implement SPF:
    • xyz, xyz xyz
  • Implement DKIM:
    • xyz
  • Implement DMARC:
    • xyz

Configure Logging (CloudTrail)

Configure Your Network (VPC)

  • Flow Logs
    • Flow Logs allow you to perform a variety of security and monitoring tasks. Turning them on is simple: [screenshot]
  • Security Group rules
    • Security Group rules restrict inbound internet access to your system.
    • You should have Port 443 open to the broader internet. If you can restrict it to a specific list of IP Addresses, say a few clinics, even better.
    • Port 22 should only be open to the specific IP address of the admin who needs to SSH in.
    • [screenshots]

Monitor Cyber Attacks (GuardDuty)

  • xyz


Create a Load Balancer (EC2)

  • Application Load Balancer


Set up a Firewall (WAF)

  • xyz