Use separate VPCs for different environments One of the best practices for enhancing the security…
Use cases for IAM roles – Identity and Access Management – Securing Users, Roles, and Policies
Use cases for IAM roles Roles are designed to provide temporary access to AWS resources,…
Comparing IAM identity types – Identity and Access Management – Securing Users, Roles, and Policies
Comparing IAM identity types The following table (Table 3.3) compares the different types of IAM…
Managing IAM policies – Identity and Access Management – Securing Users, Roles, and Policies
Managing IAM policies IAM policies play a pivotal role in defining permissions within AWS. They…
Minimize exposure of resources to the internet – Infrastructure Security – Keeping Your VPC secure
Minimize exposure of resources to the internet A common mistake in VPC design is the…
Using security groups – Infrastructure Security – Keeping Your VPC secure
Using security groups Security groups control both inbound and outbound traffic, offering a robust line…
Common mistakes – Infrastructure Security – Keeping Your VPC secure
Common mistakes While security groups are a powerful tool, they can lead to security vulnerabilities…
Using AWS Network Firewall – Infrastructure Security – Keeping Your VPC secure
Using AWS Network Firewall AWS Network Firewall is a stateful, managed service that provides a…
Configuring AWS Shield and AWS WAF for advanced protection – Infrastructure Security – Keeping Your VPC secure
Configuring AWS Shield and AWS WAF for advanced protection Moving forward in this chapter, this…
Understanding ABAC – Identity and Access Management – Securing Users, Roles, and Policies
Understanding ABAC ABAC is a flexible and granular access control model that uses attributes as…