Web Application Firewall (WAF) AWS Web Application Firewall (WAF) is a managed security service that helps protect web applications from common web exploits and malicious traffic. When you use this service, you define customizable security rules to filter and block potentially harmful requests. By leveraging AWS WAF, organizations can fortify their web applications against various…
Author: zeusexam
Some AWS Security Features
Some AWS Security Features I want to be perfectly clear: There are currently a ton of security services and tools in the AWS portfolio of products. In this section of the chapter, we will explore two that are fundamental to the operation of AWS: security groups and network access control lists (NACLs). We will also…
Other Access Management-Related AWS Services
Other Access Management-Related AWS Services At this point in this text, I am sure you are not surprised to learn that there are plenty of services available in AWS to assist with identity and access management. Let’s look at just some of them here: AWS IAM Identity Center: This service was previously named AWS Single…
Best Practices with IAM – CLF-C02 Exam Guide
Review IAM permissions: You should not use a “set and forget” policy when it comes to your permissions in IAM. You should consistently review the permissions level assigned to ensure that you are following least privilege concepts and that you are still granting those permissions to the groups that require them. There is even a…
Best Practices with IAM – CLF-C02 Exam Guide
Best Practices with IAM While IAM in AWS provides many exciting capabilities, its complexity can cause organizations to make fatal mistakes when working with the service. This section highlights some best practices that can save you from making such mistakes. You should consider following most (if not all) of these recommendations: Use the root account…
Identity and Access Management
Identity and Access Management When it comes to accessing your AWS account and working inside it, you need the Identity and Access Management (IAM) services of AWS. IAM allows you to grant access to other individuals for team management of the services. IAM permits extremely granular permissions. For example, you might grant someone read access…
AWS Security Compliance Programs
AWS Security Compliance Programs How does Amazon measure its success when it comes to compliance with security best practices and regulations? Through the success of its many customers! Customers drive AWS efforts in these categories (to name just a few): Compliance reports Attestations Certifications Compliance programs and your adherence to them will help you implement…
An Introduction to AWS Security
An Introduction to AWS Security Amazon understands that a major concern for many organizations considering moving to public (or hybrid) clouds is security. As a result, it has taken great pains to ensure that incredible levels of security are available for your organization, including massive efforts around confidentiality, integrity, and availability (CIA). The CIA triad,…
AWS Responsibilities
AWS Responsibilities Remember that Amazon is considered responsible for security of the cloud. That is, AWS is responsible for protecting the infrastructure that runs the services chosen, including the hardware and software required to power the AWS service as well as the networking and facilities used. Specific Amazon responsibilities include the following: Cloud software, including…
Understanding the Shared Responsibility Model
Understanding the Shared Responsibility Model The AWS shared responsibility model divides the security responsibilities between two parties: the AWS customer (you) and Amazon (AWS). The fact that you are no longer responsible for a massive portion of the security required for scalable data centers is a huge advantage. You can leverage the massive budgets of…