Well done! We have to come the end of this chapter, so let's summarize what we have covered.
In this chapter, we understood the shared responsibility model between AWS and the customer to make the environment more secure. We also discussed Identity and Access Management in detail and implemented all the best practices that are available in the IAM Dashboard that were not compliant earlier. We configured multi-factor authentication for an AWS root account by using the Google Authentication application to make root account access more robust.
Finally, we discussed Security Groups and Network ACL, and also mentioned the differences between both of them.
In the next chapter, we will look at the day-to-day issues we encounter while creating and managing AWS resources.