O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Quick recap

Security is a very important aspect for any organization. IAM plays a vital role in securing your infrastructure and application. In this chapter, you have learned about different aspects of IAM, and also about how to define the access of AWS services and resource-based permissions, cross-account access, and federated access.

Apart from this, you have learned about other AWS security services, such as:

  • AWS WAF and Shield: AWS WAF and Shield helps you implement security at Layer 7 to secure the application from cross-site scripts, MySQL injections, and DDoS attacks. We define access control policies to access the application.
  • AWS CloudHSM: It's used to store encryption keys in a highly secure and available environment. It's always ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required