Book Image

Mastering AWS Security

By : Albert Anthony
Book Image

Mastering AWS Security

By: Albert Anthony

Overview of this book

Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud. Lastly, the book will wrap up with AWS best practices for security.
Table of Contents (10 chapters)

Logging in AWS

AWS has a complete suite of services to cater to all your logging needs for adhering to your security and operational best practices, as well as meeting your compliance and regulatory requirements. So, you have all the logs that you need to capture, with storage, monitoring, and analyzing facilities available in AWS, keeping the dynamic nature of cloud computing.

To begin, let us look at various logs available in AWS. All the logs in AWS can be classified into three categories, as shown in the following table:

AWS infrastructure logs

AWS service logs

Host-based logs

AWS CloudTrail
Amazon S3
Messages
AWS VPC flow logs
AWS ELB
IIS/Apache
Amazon CloudFront
Windows Event logs
AWS Lambda
Custom logs
Table 1 - AWS logs classification

AWS infrastructure logs, such as CloudTrail Logs, contain information related to all API activity...