<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2422-4200</journal-id>
<journal-title><![CDATA[Revista Logos Ciencia & Tecnología]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. logos cienc. tecnol.]]></abbrev-journal-title>
<issn>2422-4200</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2422-42002022000200042</article-id>
<article-id pub-id-type="doi">10.22335/rlct.v14i2.1546</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Análisis de seguridad entre microservicios con Amazon Web Service]]></article-title>
<article-title xml:lang="en"><![CDATA[Amazon Web Service Microservice Security Analysis]]></article-title>
<article-title xml:lang="pt"><![CDATA[Análise de segurança de microsserviços da Amazon Web Service]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cárdenas Sánchez]]></surname>
<given-names><![CDATA[Brian Camilo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Olarte Rojas]]></surname>
<given-names><![CDATA[Carlos Arturo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Distrital Francisco José de Caldas  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Distrital Francisco José de Caldas  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2022</year>
</pub-date>
<volume>14</volume>
<numero>2</numero>
<fpage>42</fpage>
<lpage>52</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S2422-42002022000200042&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S2422-42002022000200042&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S2422-42002022000200042&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN En las últimas décadas, el aumento en el uso de sistemas de información, de las comunicaciones y la posibilidad de compartir datos al instante, a través de Internet, han traído consigo términos como la ciberseguridad, ya que desde los inicios han existido personas inescrupulosas que desean obtener información confidencial; es por ello que cada año se desarrollan nuevos vectores de ataque y con ello nuevos métodos para persuadirlos. Actualmente, existe un auge creciente sobre tecnologías basadas en microservicios y en el cloud computing, esto debido a su alta escalabilidad, mantenibilidad y facilidad para crear infraestructuras de forma segura. Amazon Web Service (AWS) ofrece diversos servicios que permiten convertir plataformas sencillas en aplicaciones robustas, usando diferentes tecnologías y bases de datos, así como también permite agregar seguridad tanto a las aplicaciones como a los datos que son la fuente principal de todo sistema; por esta razón, se realiza una exploración a la encriptación de bases de datos y documentos, usando servicios de Amazon Web Service como Key Management Service, Amazon Relational Database Service y S3. En conclusión, en caso de que un ataque se materialice, las bases de datos y los archivos encriptados no pueden ser legibles por personas malintencionadas,]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT The increase in the use of information systems, of communications through the Internet in recent decades and the possibility of sharing data instantly have brought with them terms such as cybersecurity, since, from the beginning, there have been unscrupulous people who want to obtain confidential information, that is why new attack vectors are invented every year and with it new methods to persuade them, there is currently a growing boom on technologies based on microservices and cloud computing, this due to its high scalability, maintainability and facility to create infrastructure safely. Amazon web services offers various services that allow you to convert simple platforms into robust applications with different connections, using different technologies and databases, as well as allowing you to add security to both the applications and the data, this last concept is the main source of any system. This is why in this article an exploration of the encryption on databases and documents is made, using AWS services such as Key management server, Relational database service and S3, at the end it will be found that the encrypted files and databases will not be readable by malicious people, in case an attack materializes.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[RESUMO Nas últimas décadas, o aumento da utilização de sistemas de informação, comunicações e a possibilidade de partilhar dados instantaneamente através da Internet trouxeram consigo termos como a ciber-segurança, desde o início que existem pessoas sem escrúpulos que querem obter informações confidenciais; é por isso que todos os anos são desenvolvidos novos vectores de ataque e com eles novos métodos para os persuadir. Actualmente, há um boom crescente nas tecnologias baseadas em microserviços e computação em nuvem, devido à sua elevada escalabilidade, capacidade de manutenção e facilidade de criação de infra-estruturas seguras. Amazon Web Service (AWS) oferece vários serviços que permitem converter plataformas simples em aplicações robustas, utilizando diferentes tecnologias e bases de dados, bem como adicionar segurança tanto às aplicações como aos dados que são a principal fonte de qualquer sistema; por esta razão, é realizada uma exploração da encriptação de bases de dados e documentos, utilizando serviços Amazon Web Service, tais como o Serviço de Gestão de Chaves, o Serviço de Bases de Dados Relacionais da Amazon e o S3. Em conclusão, no caso de um ataque se materializar, as bases de dados e ficheiros encriptados não podem ser lidos por pessoas mal intencionadas.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Encriptación]]></kwd>
<kwd lng="es"><![CDATA[cifrado]]></kwd>
<kwd lng="es"><![CDATA[cibercrimen]]></kwd>
<kwd lng="es"><![CDATA[seguridad de datos]]></kwd>
<kwd lng="en"><![CDATA[Encryption]]></kwd>
<kwd lng="en"><![CDATA[cipher]]></kwd>
<kwd lng="en"><![CDATA[computer crime]]></kwd>
<kwd lng="en"><![CDATA[data security]]></kwd>
<kwd lng="pt"><![CDATA[Criptografia]]></kwd>
<kwd lng="pt"><![CDATA[encriptação]]></kwd>
<kwd lng="pt"><![CDATA[cibercrime]]></kwd>
<kwd lng="pt"><![CDATA[segurança de dados]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdullah]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Advanced Encryption Standard (AES) algorithm to Encrypt and Decrypt Data]]></article-title>
<source><![CDATA[Cryptography and Network Security]]></source>
<year>2017</year>
<volume>16</volume>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<collab>Amazon Web Services</collab>
<source><![CDATA[Guía para desarrolladores: AWS Key Management Service]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>Amazon Web Services</collab>
<source><![CDATA[Amazon Elastic Block Store (EBS) Almacenamiento en bloque de alto rendimiento y con facilidad de uso a cualquier escala]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>Amazon Web Services</collab>
<source><![CDATA[lAmazon Elastic Container Service (Amazon ECS), Ejecutar contenedores de alta seguridad, fiables y escalables]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<collab>Amazon Web Services</collab>
<source><![CDATA[AWS cryptographic services and tools guide: Cryptographic algorithms]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>Amazon Web Services</collab>
<source><![CDATA[AWS Secrets Manager, Alterne, administre y recupere fácilmente credenciales de bases de datos, claves API y otros datos confidenciales durante todo su ciclo de vida]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<collab>ARN</collab>
<source><![CDATA[Top 10 most notorious cyber attacks in history]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ceballos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bautista]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Mesa]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Argáez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Miranda]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Acevedo]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Prada]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruiz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Santos]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tendencias Cibercrimen Colombia 2019-2020]]></source>
<year>2019</year>
<publisher-name><![CDATA[TicTac]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>Centro Cibernético Policial</collab>
<source><![CDATA[Balance Cibercrimen]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<collab>Mesa Sectorial Cloud Computing</collab>
<source><![CDATA[Cloud Computing, una perspectiva para Colombia]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<collab>Computing</collab>
<source><![CDATA[Los 10 ciberataques más grandes de la década]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<collab>Data Breach</collab>
<source><![CDATA[Amadeus Traveler Data Exposed in a Thwarted Data Leak]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<collab>Digital Information World</collab>
<source><![CDATA[Canalys Report Predicts That Cybersecurity Will Demonstrate an Estimated 10 percent Growth]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<source><![CDATA[Encrypting Amazon RDS resources - Amazon Relational Database Service]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<collab>Interpol</collab>
<source><![CDATA[Ciberamenazas relacionadas con la CO-VID-19]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyons]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Worst Cybera-ttacks of 2021 (So Far)]]></source>
<year>2021</year>
<publisher-name><![CDATA[Sdxcentral]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McGrew]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Viega]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Security and Performance of the Galois/Counter Mode (GCM) of Operation]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Canteaut]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Viswanathan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Progress in Cryptology - INDOCRYPT 2004. Lecture Notes in Computer Science]]></source>
<year>2004</year>
<page-range>343-55</page-range><publisher-name><![CDATA[Heidelberg]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mehrotra]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Turton]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[CNA Financial Paid $40 Million in Ransom After March Cyberattack]]></article-title>
<source><![CDATA[Insurance Journal]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naren]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sowmya]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Deepika]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Layers of Cloud - IaaS, PaaS and SaaS: A Survey]]></article-title>
<source><![CDATA[International Journal of Computer Science and Information Technology]]></source>
<year>2014</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>4477-80</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pagnnota]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Los 10 incidentes de seguridad más grandes de 2016]]></source>
<year>2016</year>
<publisher-name><![CDATA[Welivesecurity]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Overflow.]]></surname>
<given-names><![CDATA[Stack]]></given-names>
</name>
</person-group>
<source><![CDATA[Developer Survey 2021]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>The Hacker News</collab>
<source><![CDATA[427 Million Myspace Passwords leaked in major Security Breach]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Waldman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[10 of the biggest cyber attacks of 2020]]></source>
<year>2021</year>
<publisher-name><![CDATA[TechTarget]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
