Migration Hub and Application Discovery
Migration Hub centralizes migration data from various tools and displays workflows from services such as application migration, Systems Manager, and database migration service. Its main concern is Identity and Access Management (IAM), so ensuring proper access controls is crucial due to the sensitive nature of migration data.Only grant Migration Hub access to users who truly need it. While Migration Hub aggregates workflows, the underlying services are already highly secure.


Application Discovery Service
The Application Discovery Service (ADS) collects metadata from your on-premises servers via agents, agentless methods, or vCenter outputs, and transfers the data securely to AWS. This service is focused on discovery rather than migration. Agents installed on your servers gather details about running applications and send them securely for analysis.


Application Migration and Database Migration Service (DMS)
Application Migration Service (AMS)
The Application Migration Service (AMS) replicates and transitions your entire environment to AWS. Replace the retired Server Migration Service with Elastic Disaster Recovery. AMS installs an agent on your source environment, replicates the setup to AWS, and then conducts a cutover. It utilizes IAM for permission management and integrates with CloudWatch and CloudTrail for real-time logging.

Database Migration Service (DMS)
DMS is designed for migrating large, sensitive database workloads. The security profile of the migration depends largely on the target destination. For example, using an encrypted Aurora cluster or an S3 bucket with server-side encryption ensures that the data remains secure. Key DMS features include: • Support for full copy loads and continuous data replication via change data capture (CDC)• Comprehensive logging, capturing all DML commands and operations, with time travel logs to review historical changes Consider the SQL command below, which reveals the structure of a migrated table:
Enabling CDC is vital for synchronization between source and target databases. Detailed logs assist in resolving replication issues.








Elastic Disaster Recovery Service
The Elastic Disaster Recovery Service replicates entire suites of virtual machines using block-level replication. It transfers data securely from a source to a target, inheriting encryption settings from the source instance. Network security is maintained by applying security groups during the transfer.


Mainframe Modernization
Mainframe Modernization involves analyzing, refactoring, and replatforming legacy mainframe processes into an automated DevOps pipeline. Security best practices include implementing strong access policies, ensuring encryption at rest and in transit, and following best practices from the underlying services used during modernization.
Data Transfer Services
AWS DataSync
AWS DataSync uses an on-premises agent to transfer storage data into AWS storage services such as S3, EFS, or FSx. As a serverless and managed service, DataSync leverages TLS to secure data in transit. However, when transferring data to an unencrypted S3 bucket, enable server-side encryption to maintain data security.

AWS Transfer Family
The AWS Transfer Family provides secure file transfers using protocols such as SFTP and FTPS, while excluding FTP due to its inherent security weaknesses. Custom security policies can be configured to meet specific organizational requirements. Exercise caution when setting cryptographic algorithm options; an overly strict policy might conflict with other security requirements.


Snow Family (Storage Perspective)
The Snow Family consists of rugged hardware devices designed for secure, local data transportation in harsh environments. The Snowball Edge, a key device in this family, utilizes AWS IAM for user access management. Data stored on these devices is automatically encrypted; in-transit encryption is also enforced.

Summary
This article highlighted the key security considerations across AWS migration and transfer services. Below is a summary of the essential security themes:| Security Theme | Description |
|---|---|
| IAM Controls & Access Policies | Strictly manage who can access these services with granular IAM roles. |
| Encryption (At Rest & In Transit) | Ensure continuous encryption for data stored or transmitted. |
| Comprehensive Logging | Use AWS CloudTrail and CloudWatch for complete audit trails and issue diagnosis. |
| Managed Services | Leverage AWS managed services that simplify security configurations. |
