Book Image

Mastering AWS Security

By : Albert Anthony
Book Image

Mastering AWS Security

By: Albert Anthony

Overview of this book

Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud. Lastly, the book will wrap up with AWS best practices for security.
Table of Contents (10 chapters)

AWS CloudWatch Logs

AWS CloudWatch Logs is a monitoring, logging, and log storage feature available as part of the AWS CloudWatch service. You can consume logs from resources in any AWS region; however, you can view logs in the CloudWatch for regions where CloudWatch Logs are supported. Your log data can be encrypted using KMS at the log group level. CloudWatch Logs are primarily used for performing the following tasks:

  • Monitoring all your logs in near real-time by routing them to the AWS CloudWatch Logs; these could be your operating system logs, application logs, AWS service logs, or AWS infrastructure logs such as VPC flow logs and AWS CloudTrail Logs
  • Storing all your logs in a durable storage with configurable retention period
  • Generating logs for your EC2 instances by installing the CloudWatch Logs agent on your EC2 instances
  • Integrated with AWS services such as AWS CloudWatch...