In Chapter 5, you learned how to configure an EC2 instance as a Docker container host and learned how to deploy Windows and Linux containers directly on the host. In this chapter, I will cover AWS security and how to protect your user accounts, container hosts (EC2 instances), applications, and containers.
Security is an essential part of AWS simply because AWS is a public cloud where all servers and services can be accessed from anywhere anytime. Therefore, it is essential to protect your applications, data, and public cloud resources from unauthorized access. A security ...