Book Image

Networking and Security Best Practices on AWS [Video]

By : James Cross
Book Image

Networking and Security Best Practices on AWS [Video]

By: James Cross

Overview of this book

<p>This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.</p> <h1>Style and Approach</h1> <p>With easy to follow steps, this course explains how to get started with the fundamental technologies like Identity Access Management (IAM) and Virtual Private Clouds (VPCs).</p> <p>The course practically demonstrates how to create a secure and isolated virtual datacenter in the cloud.</p>
Table of Contents (2 chapters)
Chapter 1
Identity Access Management
Content Locked
Section 4
IAM Roles and How to Use them
In this video, you will gain an understanding of how we can leverage IAM roles and policies to secure our infrastructure without needing to store access credentials. - Get to know what is a role and how we use it - Assign a role to an EC2 instance - Test the impact of roles and policies