6

Implementing Security Best Practices in Amazon EC2

As we continue exploring the world of Amazon EC2, we will turn our attention to implementing security best practices. We will start this chapter by providing a solid foundation of EC2 security, discussing the details of the relevance of security in the cloud and the shared responsibility model. Then, we will navigate the intricate terrain of IAM while putting special emphasis on roles, instance profiles, and policies. We will also discuss data encryption, both at rest and in transit, and touch base on other network security elements, such as security groups, network ACLs, and more. We will dive into areas such as operating system patch management and application-specific security considerations ...

Get Mastering Amazon EC2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.