AWS Solutions Architect Associate Certification
Designing for Security
Turning up Security on Application Integration Part 2
In this lesson, we continue our discussion on securing application integrations with a focus on Amazon AppFlow. AppFlow facilitates bi-directional data transfers between SaaS applications and AWS services. Because most of its operations involve API calls with third-party applications, its security mechanisms mirror those used in IAM. It is important to note that AppFlow is a fully managed service, unlike an ETL service such as AWS Glue, and is geared toward long-term data storage—much like Amazon Glacier—with secure data transfers. All connection details for AppFlow are safely stored in Secrets Manager, and encryption is applied to the data context.
There have been questions regarding the enhancement of security through integration with Secrets Manager. Rest assured, AppFlow seamlessly integrates with Secrets Manager to securely handle connection details.
:::note Logging and Monitoring For logging, AppFlow utilizes CloudTrail and CloudWatch to track API calls and monitor data flows. For instance, a multinational corporation may synchronize data between cloud applications and AWS services, then use CloudWatch for metrics and flow execution tracking. Supplementary tools like AWS X-Ray, AWS Config, and AWS GuardDuty can also be considered for tracing and detecting issues. :::
Messaging and Events
Next, we delve into messaging and event services, starting with the Simple Notification Service (SNS). SNS is a robust notification system that dispatches messages to a topic. Depending on the subscription configuration, these messages can be delivered to one or more endpoints such as SQS queues, email addresses, or SMS numbers. For example, a message might be replicated across three SQS queues as dictated by an application workflow. SNS secures data by encrypting both topics and queues using server-side encryption (SSE) via AWS Key Management Service (KMS).
Another diagram demonstrates SNS integrated with two queues managed by a billing Lambda function and a scheduling function, with data processed and, in some cases, routed into S3. Importantly, SNS offers Message Data Protection, which allows you to set policies that audit, redact, or block sensitive information such as Personally Identifiable Information (PII).
Moreover, SNS leverages resource policies alongside IAM to enforce fine-grained access control, ensuring only authorized entities can publish or subscribe to a topic. A common method is to manage access through IAM roles or groups, rather than relying solely on resource policies.
SNS further integrates with CloudTrail and CloudWatch to provide key metrics (e.g., the number of messages published and delivery success rates) to monitor performance and ensure timely deliveries.
A separate diagram outlines various monitoring solutions for SNS, emphasizing that CloudWatch Logs and Metrics play a fundamental role in tracking SNS performance—including practices for handling dead-letter queues when messages fail.
Amazon Simple Queue Service (SQS)
Now let’s discuss Amazon Simple Queue Service (SQS). Launched shortly after S3, SQS is a highly managed queuing service available in both standard and FIFO versions. It provides built-in encryption at rest via KMS and supports private traffic through VPC interface endpoints powered by AWS PrivateLink. Although SQS offers CloudWatch metrics and API activity tracking through CloudTrail, note that it does not log individual queue messages natively without CloudTrail integration.
For detailed insights into API call interactions, ensure that CloudTrail logging is enabled.
Amazon MQ
Moving on to Amazon MQ—a managed message broker service based on ActiveMQ (with support for RabbitMQ). Unlike SQS, Amazon MQ is tailored for scenarios where industry-standard messaging protocols (such as MQTT) and classic broker functionalities are required. Amazon MQ ensures security using KMS for encryption at rest and supports encrypted data in transit.
Amazon EventBridge
Amazon EventBridge is a fully managed event bus that efficiently routes events based on defined rules. It encrypts data by default using the AES-256 algorithm and provides a seamless connection between applications without acting as a traditional broker, streaming service, or managed workflow service. To monitor EventBridge, leverage CloudWatch metrics and CloudTrail, along with optional tools such as AWS X-Ray and AWS Config.
Amazon Simple Email Service (SES)
Amazon Simple Email Service (SES) differs from SNS in its focus on sending bulk emails. SES supports multiple actions such as sending emails, storing them on S3, and processing content via Lambda (for tasks like language detection before resending). SES applies AES-256 encryption by default for data in transit and supports encryption at rest. Its standard logging capabilities are available through CloudWatch or Kinesis Data Firehose, and event notifications can be configured with SNS.
In one scenario, emails from an SES domain are processed via an SNS fan-out, stored in S3, and managed by additional AWS services. SES also features an event publishing function that relays data on deliveries, bounces, complaints, and more. Tools such as the Reputation Dashboard help track email performance and ensure compliance with industry standards.
Workflows and Orchestration
AWS Step Functions
AWS Step Functions serves as an orchestrator and state machine for coordinating tasks, often managing multiple Lambda functions. Security is primarily enforced through IAM policies that restrict both invocation and execution rights, thereby preventing runaway workflows. Monitoring is achieved via CloudWatch, CloudTrail, and AWS X-Ray, while integration with SNS provides timely notifications to users.
Amazon Simple Workflow Service (SWF)
An older orchestration service, Amazon SWF, is used for coordinating complex tasks (such as credit card processing or order management) through both sequential and parallel steps. SWF requires the invocation of underlying resources, and similar to other AWS services, it supports standard encryption and logging via CloudWatch and CloudTrail.
Additional monitoring for SWF is accomplished using CloudWatch metrics, while changes in configuration are tracked with CloudTrail and AWS Config.
AWS Managed Workflows for Apache Airflow (MWAA)
The final service covered in this lesson is AWS Managed Workflows for Apache Airflow (MWAA). This fully managed solution abstracts away the complexities of managing Apache Airflow components (such as schedulers, workers, and the metadata database), enabling you to focus on designing and running complex ETL workflows. MWAA leverages Amazon Aurora for metadata storage and integrates seamlessly with AWS services for logging and security via CloudWatch and IAM.
Summary
In this lesson, we covered various AWS application integration services designed to enhance operational scaling by serving as intermediaries between compute and data storage. Key takeaways include:
- Built-In Encryption: Most managed services offer encryption by default for data at rest and in transit.
- Robust Logging and Monitoring: CloudWatch and CloudTrail are typically used for logging and monitoring. In some cases, AWS X-Ray and AWS Config provide deeper insights.
- Managed and Secure Integration: These services reduce the need for manual configuration while ensuring strong security and operational oversight.
We look forward to exploring additional topics in our next lesson. Thank you for following along.
Watch Video
Watch video content