April 2024
Intermediate to advanced
614 pages
14h 25m
English
As you continue to work on securing your AWS environment so that your data is effectively protected both in transit and at rest, you need to ensure that the initial points of contact that your users have with your applications are also secure. As the primary users of the network, your corporate users are the ones most likely to interact with the AWS environment most frequently, especially for transactions that require elevated access.
This chapter explores various connectivity options and their associated security measures to establish and maintain secure connections between your personal or corporate environment and your AWS environment. You will examine the configuration of security features such ...
Read now
Unlock full access