In this lesson, we learned about securing applications that are built on top of AWS resources. We went through WAF in detail to protect web applications in AWS and learned about the benefits and lifecycle of Web Application Firewall. We also walked through the process of automating security with WAF.
Furthermore, we went through the process of signing AWS API requests for securing data in transit along with securing information stored in API itself.
Lastly, we learned about two AWS services that are used by developers to secure their web and mobile applications--Amazon Cognito for user management and Amazon API Gateway for managing and securing APIs.
In the next lesson, AWS Security Best Practices, we will learn about AWS security best practices. ...