Introduction
AWS security overview
()
What you should know
()
1. AWS Security Foundations
Understanding shared responsibility
()
Understanding the AWS security landscape
()
Understanding separation of duties
()
Implementing separation of duties
()
Understanding CloudTrail
()
Enabling CloudTrail
()
Understanding AWS Organizations
()
The AWS Command Line Interface (CLI) for Mac
()
The AWS Command Line Interface (CLI) for Windows
()
2. Identity and Access Management (IAM) Concepts in AWS
Understanding IAM
()
Understanding IAM policies
()
Configuring IAM policies
()
Understanding IAM groups
()
Configuring IAM groups
()
Configuring web console access
()
Configuring IAM users: Web console
()
Challenge: IAM
()
Solution: IAM
()
Understanding IAM roles
()
Configuring IAM roles
()
Understanding Security Token Service
()
Granting temporary access
()
Illustrating access restrictions
()
Exploring IAM policy simulator
()
Exploring federated access in AWS
()
Use case: Securing financial access
()
Accessing financial account details
()
3. S3 Access Management
Managing S3 access
()
Accessing S3 privately
()
Managing S3 with IAM
()
Restricting S3 access with IAM
()
Illustrating EC2 S3 access with IAM
()
S3 bucket policies
()
Illustrating S3 bucket policies with CLI
()
Understanding S3 access control lists
()
Exploring presigned URLs
()
4. Key Management
Understanding Key Management Service
()
Creating a KMS key
()
Using a KMS in S3
()
Using KMS and an IAM role
()
Automating KMS key rotation
()
Deleting a KMS key
()
Understanding Secrets Manager
()
Using Secrets Manager
()
Enabling auto-rotation with Secrets Manager
()
Understanding AWS CloudHSM
()
5. Internal Detective Controls
Understanding AWS Config
()
Enabling AWS Config
()
Exploring AWS Config results
()
Understanding AWS GuardDuty
()
Exploring AWS GuardDuty
()
Understanding AWS Macie
()
Understanding IAM Access Analyzer
()
Understanding Amazon Detective
()
Exploring Amazon Detective
()
Understanding Amazon Inspector
()
Exploring Amazon Inspector
()
6. Additional Protective Tools
Understanding web application firewall
()
Configuring web application firewall
()
Understanding AWS Shield
()
Understanding Certificate Manager
()
Creating a private certificate
()
7. Security Audits in AWS
Understanding AWS Security Hub
()
Using AWS Security Hub
()
Rotating access keys
()
Understanding AWS Artifact
()
Understanding Trusted Advisor
()
Exploring Trusted Advisor
()
Preparing for a security audit
()
Ex_Files_AWS_Enterprise_Security.zip
(10 KB)