O'Reilly logo

AWS: Security Best Practices on AWS by Albert Anthony

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this lesson, we learned about securing applications that are built on top of AWS resources. We went through WAF in detail to protect web applications in AWS and learned about the benefits and lifecycle of Web Application Firewall. We also walked through the process of automating security with WAF.

Furthermore, we went through the process of signing AWS API requests for securing data in transit along with securing information stored in API itself.

Lastly, we learned about two AWS services that are used by developers to secure their web and mobile applications--Amazon Cognito for user management and Amazon API Gateway for managing and securing APIs.

In the next lesson, AWS Security Best Practices, we will learn about AWS security best practices. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required