Book Image

AWS: Security Best Practices on AWS

By : Albert Anthony
Book Image

AWS: Security Best Practices on AWS

By: Albert Anthony

Overview of this book

With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike. This book focuses on using native AWS security features and managed AWS services to help you achieve continuous security. Starting with an introduction to Virtual Private Cloud (VPC) to secure your AWS VPC, you will quickly explore various components that make up VPC such as subnets, security groups, various gateways, and many more. You will also learn to protect data in the AWS platform for various AWS services by encrypting and decrypting data in AWS. You will also learn to secure web and mobile applications in AWS cloud. This book is ideal for all IT professionals, system administrators, security analysts, solution architects, and chief information security officers who are responsible for securing workloads in AWS for their organizations. This book is embedded with useful assessments that will help you revise the concepts you have learned in this book. This book is repurposed for this specific learning experience from material from Packt's Mastering AWS Security, written by Albert Anthony.
Table of Contents (9 chapters)

Preface

With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike. AWS provides many controls to secure customer workloads and quite often customers are not aware of their share of security responsibilities, and the security controls that they need to own and put in place for their resources in the AWS cloud.

What's in It for Me?

Maps are vital for your journey, especially when you're holidaying in another continent. When it comes to learning, a roadmap helps you in giving a definitive path for progressing towards the goal. So, here you're presented with a roadmap before you begin your journey.

This book is meticulously designed and developed in order to empower you with all the right and relevant information on AWS. We've created this Learning Path for you that consists of five lessons:

Lesson 1, AWS Virtual Private Cloud, talks about creating and securing our own virtual network in the AWS cloud. This lesson also introduces you to the various connectivity options that AWS provides to create hybrid cloud, public cloud, and private cloud solutions.

Lesson 2, Data Security in AWS, covers encryption in AWS to secure your data in rest and while working with AWS data storage services.

Lesson 3, Securing Servers in AWS, explains ways to secure your infrastructure in AWS by employing continuous threat assessment, agent-based security checks, virtual firewalls for your servers, and so on.

Lesson 4, Securing Applications in AWS, introduces you to ways to secure all your applications developed and deployed in the AWS environment. You will walk through the web application firewall service, as well as securing a couple of AWS services used by developers for web and mobile application development.

Lesson 5, AWS Security Best Practices, walks you through best practices in a consolidated form for securing all your resources in AWS.

What Will I Get from This Book?

  • Get familiar with VPC components, features, and benefits

  • Learn to create and secure your private network in AWS

  • Explore encryption and decryption fundamentals

  • Understand monitoring, logging, and auditing in AWS

  • Ensure data security in AWS

  • Secure your web and mobile applications in AWS

  • Learn security best practices for IAM, VPC, shared security responsibility model, and so on

Prerequisites

This book is for all IT professionals, system administrators, security analysts, solution architects, and chief information security officers who are responsible for securing workloads in AWS for their organizations. Some of the prerequisites that is required before you begin this book are:

  • Working knowledge on AWS is required

  • Working knowledge of Linux is assumed