Create stronger, more secure applications for AWS deployment. Learn security best practices for Identity and Access Management, S3 storage, Key Management Service (KMS), and more.
Overview
Syllabus
Introduction
- Securing your application
- What you should know
- Important concepts
- Uses and access keys
- Roles and policies
- IAM key points
- Challenge: IAM roles and policies
- Solution: IAM roles and policies
- S3 as a static website
- Bucket policies
- S3 bucket encryption
- S3 object versioning and MFA delete
- S3 key points
- Challenge: S3 presigned URL challenge
- Solution: S3 presigned URL challenge
- Key Management Service (KMS) introduction
- Using AWS KMS
- KMS key points
- Challenge: Key Management Service
- Solution: Key Management Service
- Cognito concepts
- Workflow
- Cognito demonstration
- Cognito key points
- Challenge: Cognito automated login
- Solution: Cognito automated login
- Creating and managing certificates
- Using certificates with AWS Resources
- AWS Certificates Manager and EC2 instances
- Parameter Store for sensitive data
- Using Parameter Store from EC2
- Secrets Manager overview
- Root login alerts
- Detecting unauthorized instance stops
- Checking for unused credentials
- Get familiar with AWS tools
Taught by
Carlos Rivas