Book Image

AWS Administration - The Definitive Guide - Second Edition

By : Yohan Wadia
Book Image

AWS Administration - The Definitive Guide - Second Edition

By: Yohan Wadia

Overview of this book

Many businesses are moving from traditional data centers to AWS because of its reliability, vast service offerings, lower costs, and high rate of innovation. AWS can be used to accomplish a variety of both simple and tedious tasks. Whether you are a seasoned system admin or a rookie, this book will help you to learn all the skills you need to work with the AWS cloud. This book guides you through some of the most popular AWS services, such as EC2, Elastic Beanstalk, EFS, CloudTrail, Redshift, EMR, Data Pipeline, and IoT using a simple, real-world, application-hosting example. This book will also enhance your application delivery skills with the latest AWS services, such as CodeCommit, CodeDeploy, and CodePipeline, to provide continuous delivery and deployment, while also securing and monitoring your environment's workflow. Each chapter is designed to provide you with maximal information about each AWS service, coupled with easy to follow, hands-on steps, best practices, tips, and recommendations. By the end of the book, you will be able to create a highly secure, fault-tolerant, and scalable environment for your applications to run on.
Table of Contents (17 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Summary


Here's a quick round up of the topics that we have covered so far in this chapter.

We started off by learning and understanding a bit about the Web Application Firewall service and how it works to protect against potential security threats and exploits. We later looked at how to get started with WAF by safeguarding our previously deployed WordPress application against restrictive access by leveraging the IP Match, as well as the string/regex match conditions. We also looked at how to mitigate and safeguard your applications by leveraging advanced WAF conditions in the form of SQL injection and cross-site scripting. Towards the end, we covered how to leverage certain pre-built CloudFormation templates to automate the deployments of our WAF rules and, finally, we concluded the chapter with a brief introduction to AWS Shield and its various tiers.

In the next chapter, we will be continuing on our security journey and will cover two really amazing services as well: AWS CloudTrail and AWS...