From the course: Complete Guide to the AWS Well-Architected Framework
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Protecting AWS credentials - Amazon Web Services (AWS) Tutorial
From the course: Complete Guide to the AWS Well-Architected Framework
Protecting AWS credentials
- [Instructor] One of the important jobs when running applications in the AWS cloud is to think of all of the access points and to think of how am I going to protect the credentials that need access to the resources? Most of the resources, when they fail, can be replaced, compute instances, services, but the data cannot, so obviously it's the most important, but the access to that data means that you have to protect that credentials. Number one job. All API actions at AWS are first going to require authentication. Who are you? I don't know who you are, you're not getting any further. If I know who you are, well, then there's going to be policies attached to your account or attached to your authentication process that, first of all, deny, implicitly deny, but potentially allow you to carry out specific tasks. Now you have to think about, who are we talking about, the person running the application on their phone, the administrators? So they all have different levels of access that…
Contents
-
-
-
-
-
-
(Locked)
Security pillar overview2m 21s
-
(Locked)
Design principles7m 14s
-
(Locked)
Identity and Access Management2m 59s
-
(Locked)
Demo: IAM security overview4m 51s
-
(Locked)
Protecting AWS credentials3m 54s
-
(Locked)
Identify threats: Detective controls3m 25s
-
(Locked)
AWS detective controls for security4m 29s
-
(Locked)
Implement an auditing workflow3m 37s
-
(Locked)
Challenge: Review a CloudTrail event56s
-
(Locked)
Solution: Review a CloudTrail event1m 23s
-
(Locked)
Auditing and notifications4m 46s
-
(Locked)
Infrastructure protection4m 57s
-
(Locked)
Key AWS services for infrastructure protection5m 55s
-
(Locked)
Data protection methods2m 18s
-
(Locked)
Key AWS services for data protection3m 15s
-
(Locked)
Protecting your data at rest at AWS1m 50s
-
(Locked)
Protecting data in transit at AWS2m 43s
-
(Locked)
Responding to security incidents2m 33s
-
(Locked)
Managing incident response4m 27s
-
(Locked)
Demo: Using the Well-Architected Tool2m 12s
-
(Locked)
-
-
-
-
-