Book Image

Implementing Cloud Design Patterns for AWS - Second Edition

By : Sean Keery, Clive Harber, Marcus Young
Book Image

Implementing Cloud Design Patterns for AWS - Second Edition

By: Sean Keery, Clive Harber, Marcus Young

Overview of this book

Whether you're just getting your feet wet in cloud infrastructure or already creating complex systems, this book will guide you through using the patterns to fit your system needs. Starting with patterns that cover basic processes such as source control and infrastructure-as-code, the book goes on to introduce cloud security practices. You'll then cover patterns of availability and scalability and get acquainted with the ephemeral nature of cloud environments. You'll also explore advanced DevOps patterns in operations and maintenance, before focusing on virtualization patterns such as containerization and serverless computing. In the final leg of your journey, this book will delve into data persistence and visualization patterns. You'll get to grips with architectures for processing static and dynamic data, as well as practices for managing streaming data. By the end of this book, you will be able to design applications that are tolerant of underlying hardware failures, resilient against an unexpected influx of data, and easy to manage and replicate.
Table of Contents (20 chapters)
Title Page
Dedication
About Packt
Contributors
Preface
Free Chapter
1
Introduction to Amazon Web Services
Index

Chapter 4. Security - Ensuring the Integrity of Your Systems

In this chapter, we will address a concern that touches on all aspects of your product. Security best practices will be covered. The three tenets of security are confidentiality, integrity, and availability. Methods we will touch upon that will help you in lowering operational risk, increasing transport layer security, simplifying user and role management, and implementing least privileges while establishing an audit trail for your product. Confidentiality addresses how we protect our data, in motion and at rest, from unauthorized access. This will allow us to establish a perimeter around all of our products from the start. Integrity focuses on the accuracy of our data. We will address different data types in the Persistence Patterns section, and so we will generalize in this chapter. 

In this chapter, we will cover the following topics:

  • Key management service
  • Credentials
  • RBAC
  • Cognito
  • Enterprise integrations
  • Logging
  • Vulnerability scanning...