April 2024
Intermediate to advanced
614 pages
14h 25m
English
Up until this point, you have looked at the different types of attacks that your accounts could be at risk of while managing your day-to-day security responsibilities, along with how to use the services provided by AWS to respond to those incidents. This included instructions on how to gather metrics and logs to keep track of the activity happening in your accounts contained within your AWS Organization.
Protecting the perimeter of your accounts, like placing a fence around your property, is both a deterrent and a barrier for keeping those who are unwanted out of your account. You can’t rely on perimeter protection alone, so ensuring that the instances running your applications are using secure best practices ...
Read now
Unlock full access