Book Image

AWS DevOps Simplified

By : Akshay Kapoor
Book Image

AWS DevOps Simplified

By: Akshay Kapoor

Overview of this book

DevOps and AWS are the two key enablers for the success of any modern software-run business. DevOps accelerates software delivery, while AWS offers a plethora of services, allowing developers to prioritize business outcomes without worrying about undifferentiated heavy lifting. This book focuses on the synergy between them, equipping you with strong foundations, hands-on examples, and a strategy to accelerate your DevOps journey on AWS. AWS DevOps Simplified is a practical guide that starts with an introduction to AWS DevOps offerings and aids you in choosing a cloud service that fits your company's operating model. Following this, it provides hands-on tutorials on the GitOps approach to software delivery, covering immutable infrastructure and pipelines, using tools such as Packer, CDK, and CodeBuild/CodeDeploy. Additionally, it provides you with a deep understanding of AWS container services and how to implement observability and DevSecOps best practices to build and operate your multi-account, multi-Region AWS environments. By the end of this book, you’ll be equipped with solutions and ready-to-deploy code samples that address common DevOps challenges faced by enterprises hosting workloads in the cloud.
Table of Contents (19 chapters)
1
Part 1 Driving Transformation through AWS and DevOps
5
Part 2 Faster Software Delivery with Consistent and Reproducible Environments
9
Part 3 Security and Observability of Containerized Workloads
13
Part 4 Taking the Next Steps

Implementing DevSecOps with AWS

Equifax, a credit reporting agency, reported unauthorized access to the personal records of 143 million US citizens in a data breach in 2017 that went unnoticed for 76 days (https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html). What started as Common Vulnerabilities and Exposures (CVE) in Apache Struts, a well known framework used by Java applications, resulted in financial and reputational damage for the company. Even after corrective measures, a few servers remained unfixed due to the dependency on manual processes. These gaps, combined with teams’ lack of awareness of security breaches in general, were exploited by malicious actors to gain access to one of the servers, and then several others. Security incidents like these harm business health and, most importantly, result in loss of customer trust, along with reputational damage.

The evolution of software practices and...