July 2025
Intermediate to advanced
788 pages
22h 16m
English
In the early 2010s, when cloud started to pick up, a common refrain from companies was that they were hesitant to move to the cloud because they believed the cloud was not secure. A big part of this pushback was that companies didn’t understand the cloud or its capabilities. It is possible to have security vulnerabilities even if you use cloud infrastructure. However, as we will see in this chapter, AWS provides a comprehensive catalog of services enabling you to create highly secure sites and applications.
When creating applications and implementing workflows, it is imperative to consider security from the start of your design and not as an afterthought. First, you will understand ...