<span><p><b>Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices</b></p> <h4>Key Features</h4> <ul><li>Explore useful recipes for implementing robust cloud security solutions on AWS </l
AWS Security Cookbook: Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
β Scribed by Heartin Kanikathottu
- Publisher
- Packt Publishing
- Year
- 2020
- Tongue
- English
- Leaves
- 440
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices As a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation. The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security β Specialty certification. If you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.Key Features
Book Description
What you will learn
Who this book is for
Table of Contents
π SIMILAR VOLUMES
<span><p><b>Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices</b></p> <h4>Key Features</h4> <ul><li>Explore useful recipes for implementing robust cloud security solutions on AWS </l
<p><b>Delve deep into various security aspects of AWS to build and maintain a secured environment</b><p><b>About This Book</b><p><li>Learn to secure your network, infrastructure, data, and applications in AWS cloud<li>Use AWS managed security services to automate security<li>Dive deep into various a
Improve cloud security within your organization by leveraging AWSβs Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment.
Running your systems in the cloud doesnβt automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security youβll learn how to: β’ Securely grant access to AWS resources to coworkers and customers β’ Develop po
AWS Security covers best practices for access policies, data protection, auditing, continuous monitoring, and incident response. To create secure applications and infrastructure on AWS, you need to understand the tools and features the platform provides and learn new approaches to configuring and