Book Image

Mastering AWS Security

By : Albert Anthony
Book Image

Mastering AWS Security

By: Albert Anthony

Overview of this book

Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud. Lastly, the book will wrap up with AWS best practices for security.
Table of Contents (10 chapters)

AWS Config

AWS Config is a fully managed AWS service that helps you capture the configuration history for your AWS resources, maintain resource inventory, audit, and evaluate changes in resource configuration, and enables security and governance by integrating notifications with these changes. You can use it to discover AWS resources in your account, continuously monitor and evaluate resource configuration against desired resource configuration, export configuration details for your resource inventory, and find out the configuration details for a resource at given point in time.

A resource is any object that you create, update or delete in AWS, such as an EC2 instance, a S3 bucket, a security group, or an EBS volume. AWS Config is used to assess compliance as per internal guidelines for maintaining resource configurations. It enables compliance auditing, security analysis, resource...