Chapter 8: Best Practices for Application Security, Identity, and Compliance
In the past, a common refrain from companies was that they were hesitant to move to the cloud because they believed the cloud was not secure. A big part of this pushback was that companies didn't understand what the cloud was or what its capabilities were. It is true that it is possible to have security vulnerabilities even if you are using cloud infrastructure. However, as we will see in this chapter, AWS provides a comprehensive catalog of services that will enable you to create extremely secure sites and applications.
It is imperative when creating applications and implementing workflows to consider security from the start of your design and not as an afterthought. ...
Get AWS for Solutions Architects now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.