Elastic File System (EFS)
Amazon Elastic File System (Amazon EFS) is based on the NFS protocol.
Network access
Amazon EFS is a managed service and located outside the customer’s VPC. Protect access to the Amazon EFS service.
Best practices
Keep Amazon EFS (that is, all storage classes) private.
Use VPC security groups to control the access between your Amazon EC2 machines and the Amazon EFS mount volumes.
To secure access from your VPC to the Amazon EFS, use AWS PrivateLink, which avoids sending network traffic outside your VPC, through a secure channel, using an interface’s VPC endpoint.
Use Amazon EFS access points to manage application access to the EFS volume.
Use STS to allow temporary access to Amazon EFS.
Use an IAM policy to enforce encryption at rest for Amazon EFS filesystems. You can do this by setting the value of elasticfilesystem:Encrypted to True inside the IAM policy condition.
For sensitive environments, use the EFS mount helper to enforce the use of encryption in transit using TLS version 1.2 when mounting an EFS volume.
Encrypt data at rest using AWS-managed CMK for Amazon EFS.
For sensitive environments, encrypt data at rest using a CMK.
Conducting auditing and monitoring
AWS allows enabling logging and auditing using Amazon CloudWatch and AWS CloudTrail.
Best practices
Enable Amazon CloudWatch alarms for excessive Amazon EFS usage (for example, a high volume of store or delete operations on a specific EFS volume).
Enable the use of AWS CloudTrail for any EFS volume to log any activity performed on the Amazon EFS API, including any activity conducted by a user, role, or AWS service.
Create a trail, using AWS CloudTrail, on any EFS volume to log events, such as a requested action, date, and time, requested parameters, and more, for access to objects stored inside AWS EFS.
Limit the access to the CloudTrail logs to a minimum number of employees, preferably those with an AWS management account, outside the scope of your end users (including outside the scope of your users), to avoid possible deletion or changes to the audit logs.