Oreilly - AWS Data Security
by Toni de la Fuente | Publisher: Packt Publishing | Release Date: June 2018 | ISBN: 9781789139877
Carry out the best practices to protect your valuable data when working with data services on the Amazon cloudAbout This VideoSecure your AWS data infrastructureDesign a layered and secured network model to protect your AWS data from third partiesGet to know AWS services and features that help you secure your dataImplement the best practices to quickly get you up and running with being secure on the AWS cloud infrastructureIn DetailAWS as a cloud platform provides a lot of features to secure your application data from the global threat environment. With a lot of data on the cloud, you must be wondering, is my data safe? This video course will guide you in different aspects of AWS Data security to help you protect your infrastructure, making it safe and secure.If you struggle to ensure that your resources are safe, especially in this age of virtualization, this course will show you exactly how to overcome these problems. With a quick introduction to AWS security, you will use its shared responsibility model for identification and access management. Next, you will monitor and audit crucial services to discover important security-related events. You will be guided to perform important security functions such as key management service, storage options, access controls, and database platform security features. Then, you will design a layered secured network, highlighting how to protect your data from third-party threats. Lastly, you will learn to roll-out your data in an emergency by using backup and disaster recovery techniques to ensure your data safety.By the end of the course, you will be capable of dealing with security scenarios and can be confident that your AWS data is safe and secure.
- Chapter 1 : Introduction to AWS Security and Shared Responsibility Model
- The Course Overview 00:03:33
- AWS Cloud Concepts and Definitions 00:07:37
- Shared Responsibility Model 00:02:33
- Design Principles 00:05:41
- Chapter 2 : Identity and Access Management Foundations
- AWS Credentials 00:06:34
- Users, Groups, Roles, and Policies 00:07:05
- Security Token Service and Instance Profiles 00:06:11
- Metadata Server 00:03:11
- Chapter 3 : Auditing and Monitoring Services
- Capture and Analyze Events 00:03:18
- CloudTrail 00:05:44
- CloudWatch Logs 00:07:02
- AWS Config, Config Rules, and Inspector 00:11:46
- GuardDuty and Macie 00:06:26
- Chapter 4 : Encryption and Key Management
- Data Storage and Classification 00:06:25
- Using KMS 00:12:08
- AWS CloudHSM 00:05:43
- Certificate Manager 00:09:25
- Chapter 5 : Storage Options and Encryption at-rest
- S3 Object Storage and Glacier 00:12:40
- Ephemeral and EBS volumes 00:08:19
- Shared Storage with EFS 00:08:53
- Migration Options and Storage GW 00:07:01
- RDS 00:09:27
- Chapter 6 : Networking Security and Encryption in-transit
- VPC, Public, and Private Subnets 00:15:48
- Security Groups and NACLs 00:08:10
- Other Networking Options: VPN, PrivateLink, and Direct Connect 00:05:38
- Load Balancers 00:06:53
- CloudFront, WAF, and Shield 00:10:17
- Chapter 7 : Reliability, Backup, and DR Principles
- Cross-AZ and Cross-Region Design Principles 00:11:08
- S3 Cross-Region Replication, Lifecycle Policies, Versioning, and Glacier 00:06:36
- EBS and RDS Backup and DR 00:06:53
- Scheduled Events with Lambda and CloudWatch Events 00:06:41
- Chapter 8 : Compliance
- Regulated Industries and AWS Compliance Programs 00:03:35
- Compliance Related Assets: Certifications, Regulations, and Frameworks 00:08:21