Book Image

Mastering AWS Security

By : Albert Anthony
Book Image

Mastering AWS Security

By: Albert Anthony

Overview of this book

Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud. Lastly, the book will wrap up with AWS best practices for security.
Table of Contents (10 chapters)

Monitoring Amazon EC2

For all your servers in the cloud that you provision through the Amazon Elastic Compute Cloud (EC2) service, monitoring is an integral part for maintaining security, availability, and an acceptable level of performance for these servers, as well as applications running on those servers. AWS provides multiple manuals as well as automated solutions for monitoring your EC2 instances comprehensively. AWS recommends having a monitoring plan in place to effectively monitor your EC2 instances so that you can have reactive as well as proactive measures in place in the event of an incident.

A typical monitoring plan contains the following information:

  • Identify resources to be monitored
  • Define tools for monitoring these resources
  • Choose metrics to be monitored for these resources
  • Define thresholds for these metrics
  • Set alarms for these thresholds with actions
  • Identify...