Our experts at kreuzwerker have been already involved in the design and implementation of the Deutsche Payment infrastructure in AWS. Terraform and Infrastructure as Code are a set baseline. Preparing the environment for further automation and PCI/DSS re-certification, the creation of hardened Amazon Machine Images (AMI) off of verified code check-ins became necessary.
By using AWS' auto-scaling and self-healing infrastructure to host applications, the foundations are prepared for golden AMI. The target machines must follow Center for Internet Security (CIS) guidelines and have to contain the verified software for fast start-up times.
A multi-stage build process was implemented by using AWS CodeCommit, CodeBuild and CodePipeline. The first stages check that commits are signed by a permitted author, only then the build continues. By using HashiCorps packer and modern Amazon Linux 2, CIS rules are applied to the AMI before baking in the actual software and encrypting the volume. As an additional management tool, AWS Inspector is added to permanently monitor running instances on compliance.
kreuzwerker designed the process together with the Deutsche Payment and described the infrastructure in Terraform. We also provided tools to update running applications in-place with new AMI as well as housekeeping functionality.
By setting up an automated build process, the resulting environment is always benefitting from updated and AWS managed security patches and threat knowledge, while putting the applications under full compliance monitoring using AWS Inspector.
Hardening the used infrastructure from the very beginning and permanently monitoring it on compliance using the full AWS feature set enables the Deutsche Payment to further develop their offerings, while running it fully scalable and secure on fully managed AWS IaaS.