Book Image

AWS Networking Cookbook

By : Satyajit Das, Jhalak Modi
Book Image

AWS Networking Cookbook

By: Satyajit Das, Jhalak Modi

Overview of this book

This book starts with practical recipes on the fundamentals of cloud networking and gradually moves on to configuring networks and implementing infrastructure automation. This book then supplies in-depth recipes on networking components like Network Interface, Internet Gateways, DNS, Elastic IP addresses, and VPN CloudHub. Later, this book also delves into designing, implementing, and optimizing static and dynamic routing architectures, multi-region solutions, and highly available connectivity for your enterprise. Finally, this book will teach you to troubleshoot your VPC's network, increasing your VPC's efficiency. By the end of this book, you will have advanced knowledge of AWS networking concepts and technologies and will have mastered implementing infrastructure automation and optimizing your VPC.
Table of Contents (10 chapters)

Submitting a penetration testing request

Penetration testing is a cyber attack against your infrastructure to test exploitable vulnerabilities. The main objective of pen testing is to determine security weakness. AWS considers pen testing as abusive behavior so it, by default, blocks the source IP. Before performing pen testing, you need to inform AWS about the test.

Getting ready

You can request authorization for penetration testing by signing in with your root account credentials and filling out the AWS Vulnerability/Penetration Testing Request Form. AWS will follow up on your request within 2 business days.

You cannot perform pen testing on small/micro/nano EC2 or RDS instances.

...