
AWS All-in-one Security Guide
Design, Build, Monitor, and Manage a Fortified Application Ecosystem on AWS
- English
- ePUB (mobile friendly)
- Available on iOS & Android
AWS All-in-one Security Guide
Design, Build, Monitor, and Manage a Fortified Application Ecosystem on AWS
About this book
Learn to build robust security controls for the infrastructure, data, and applications in the AWS Cloud.
Key Features
? Takes a comprehensive layered security approach that covers major use-cases.
? Covers key AWS security features leveraging the CLI and Management Console.
? Step-by-step instructions for all topics with graphical illustrations.
? Relevant code samples written in JavaScript (for Node.js runtime).
Description
If you're looking for a comprehensive guide to Amazon Web Services (AWS) security, this book is for you. With the help of this book, cloud professionals and the security team will learn how to protect their cloud infrastructure components and applications from external and internal threats.The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure.
What you will learn
? Learn to create a layered security architecture and employ defense in depth.
? Master AWS IAM and protect APIs.
? Use AWS WAF, AWS Secrets Manager, and AWS Systems Manager Parameter Store.
? Learn to secure data in Amazon S3, EBS, DynamoDB, and RDS using AWS Key Management Service.
? Secure Amazon VPC, filter IPs, use Amazon Inspector, use ECR image scans, etc.
? Protect cloud infrastructure from DDoS attacks and use AWS Shield.
Who this book is for
The book is intended for cloud architects and security professionals interested in delving deeper into the AWS cloud's security ecosystem and determining the optimal way to leverage AWS security features. Working knowledge of AWS and its core services is necessary.
Table of Contents
1. Introduction to Security in AWS
2. Identity And Access Management
3. Infrastructure Security
4. Data Security
5. Application Security
6. Logging, Monitoring, And Auditing
7. Security Best Practices
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
CHAPTER 1
Introduction to Security in AWS
Introduction
Structure
- Shared responsibility model
- Important AWS security service offerings
- Security guidance offered by AWS
- Quick note on AWS Management Console
Objectives
Shared responsibility model

Security of the cloud – AWS responsibility

Security in the cloud – customer responsibility

Controls in shared responsibility model
Inherited controls
- Physical and environmental controls: This includes the physical access to the AWS facilities and involves various strict and controlled access to the facilities, professional security staff at ingress points, video surveillance, intrusion detection systems, multi-factor authentication, decommissioning physical storage devices, etc. The environmental controls like fire detection and suppression, power, climate, and temperature controls also fall under this category.
- Controls For Business Continuity Management: The AWS data centers are always built in clusters in various geographical regions to offer greater availability. The core applications are load-balanced and deployed in the N+1 configurations, so that the architecture can handle the data center failures. Availability Zones (AZs) are engineered to be physically separated within a metropolitan region and are located in the lower-risk flood plains. To reduce the single point of failure, in addition to the uninterruptable power supply (UPS) and the on-site backup generation facilities, AZs are also fed via different power grids from the independent sources.
- Network Security Controls: AWS has state-of-the-art, high bandwidth, fault-tolerant network infrastructure that is strictly monitored and managed. The boundary devices and other network devices manage the rulesets and traffic flow policies that are approved by Amazon Information Security. AWS has a limited number of access points to the cloud placed strategically that offer comprehensive ingress and egress traffic monitoring. These are called API endpoints, and they allow the HTTPS traffic only.
Shared controls
- Patch management: AWS is responsible for patching and fixing the issues within the infrastructure, including network, hypervisor, host OS, etc. The customers are responsible for patching their guest OS and applications hosted on top of the infrastructure. AWS does provide services like AWS Systems Manager-Patch Manager that can be used by the customers to facilitate the patching process.
- Configuration management: AWS maintains and manages the configuration of its infrastructure devices, and the customers are responsible for configuring their own guest OS, databases, and applications.
- Awareness and training: While AWS train the AWS employees with the knowledge about the security controls in place, the customers are responsible for training and educating the internal cloud employees.
Fully controlled by the customer
- Service and communications protection/zone security: The customers may require routing or zoning the data within the specific security environments.
Important AWS security service offerings
AWS Identity and Access Management (IAM)
Amazon Virtual Private Cloud (VPC)
Table of contents
- Cover Page
- Title Page
- Copyright Page
- About the Author
- About the Reviewer
- Acknowledgement
- Preface
- Errata
- 1. Introduction to Security in AWS
- 2. Identity and Access Management
- 3. Infrastructure Security
- 4. Data Security
- 5. Application Security
- 6. Logging, Monitoring, and Auditing
- 7. Security Best Practices
- Index