-
Book Overview & Buying
-
Table Of Contents
AWS Security Cookbook - Second Edition
By :
AWS Security Cookbook
By:
Overview of this book
As a security consultant, implementing policies and best practices to secure your infrastructure is critical. This cookbook discusses practical solutions for safeguarding infrastructure, covering services and features within AWS that help implement security models, such as the CIA triad (confidentiality, integrity, and availability) and the AAA triad (authentication, authorization, and accounting), as well as non-repudiation.
This updated second edition starts with the fundamentals of AWS accounts and organizations. The book then guides you through identity and access management, data protection, network security, and encryption. You’ll explore critical topics such as securing EC2 instances, managing keys with KMS and CloudHSM, and implementing endpoint security. Additionally, you’ll learn to monitor your environment using CloudWatch, CloudTrail, and AWS Config, while maintaining compliance with services such as GuardDuty, Macie, and Inspector. Each chapter presents practical recipes for real-world scenarios, allowing you to apply security concepts.
By the end of this book, you’ll be well versed in techniques required for securing AWS deployments and be prepared to gain the AWS Certified Security – Specialty certification.
Table of Contents (13 chapters)
Preface
Chapter 1: Setting Up AWS Accounts and Organization
Chapter 2: Access Management with IAM Policies and Roles
Chapter 3: Key Management with KMS and CloudHSM
Chapter 4: Securing Data on S3 with Policies and Techniques
Chapter 5: Network and EC2 Security with VPCs
Chapter 6: Web Security Using Certificates, CDNs, and Firewalls
Chapter 7: Monitoring with CloudWatch, CloudTrail, and Config
Chapter 8: Compliance with GuardDuty, Macie, Inspector, and Analyzer
Chapter 9: Advanced Identity and Directory Management
Chapter 10: Additional Services and Practices for AWS Security
Index