Book Image

AWS Certified Developer - Associate Guide - Second Edition

By : Vipul Tankariya, Bhavin Parmar
5 (2)
Book Image

AWS Certified Developer - Associate Guide - Second Edition

5 (2)
By: Vipul Tankariya, Bhavin Parmar

Overview of this book

This book will focus on the revised version of AWS Certified Developer Associate exam. The 2019 version of this exam guide includes all the recent services and offerings from Amazon that benefits developers. AWS Certified Developer - Associate Guide starts with a quick introduction to AWS and the prerequisites to get you started. Then, this book will describe about getting familiar with Identity and Access Management (IAM) along with Virtual private cloud (VPC). Next, this book will teach you about microservices, serverless architecture, security best practices, advanced deployment methods and more. Going ahead we will take you through AWS DynamoDB A NoSQL Database Service, Amazon Simple Queue Service (SQS) and CloudFormation Overview. Lastly, this book will help understand Elastic Beanstalk and will also walk you through AWS lambda. At the end of this book, we will cover enough topics, tips and tricks along with mock tests for you to be able to pass the AWS Certified Developer - Associate exam and develop as well as manage your applications on the AWS platform.
Table of Contents (30 chapters)
Free Chapter
1
Overview of AWS Certified Developer - Associate Certification

Security

While creating a VPC, security is one of the most critical aspects of the VPN of an organization. As AWS states in many of its official communications, the security of the customer network is one of its highest priorities. Keeping security at the top of the AWS charter, Amazon provides two features for taking care of network security and one feature for monitoring the network.

Security groups and NACLs are for network security and flow logs are for network monitoring. Security groups act as an EC2 instance-level firewall, while NACLs act as a subnet-level firewall. Flow logs provide insight into network traffic. In the following sections in this chapter, these features will be described in detail.

To start with, let's take a high-level overview of the difference between security groups and NACLs. The layers of communication, as shown in the following diagram, help...