O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Quick recap

In AWS, we have VPC. It's an isolated boundary under which your infrastructure resides and your application runs. At VPC level, we defined subnets to further isolate traffic by defining DMZ and MZ zones.

NACL and security groups are used to define ingress and egress traffic. The NACL rule works on the basis of sequence number.

To connect the AWS Cloud with on-premise infrastructure, we have the following different methods:

  • VPN connections: In a VPN connection, we create a site-to-site VPN tunnel between an on-premise infrastructure and AWS using customer gateway and VGW. AWS supports almost all the available firewalls on the market for VPN connections.
  • Direct Connect: If you want to transfer massive amounts of data to and from ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required