Cover
Table of Contents
Title Page
Copyright
Dedication
Preface
Acknowledgments
Chapter 1: Introduction to Cloud Security
Understanding Cloud Computing
AWS’s Role in Cloud Computing
Chapter 2: AWS Security Fundamentals
AWS Security Service and Features
Security Best Practices
The AWS Well-Architected Framework
Conclusion
Reference
Chapter 3: Identity and Access Management on AWS
Overview
Use Cases for IAM
Understanding the Lingo
Policies and Permissions in IAM
IAM Identities and Managing Access
Creating an IAM
IAM User Groups
IAM Roles
IAM Policies
, AWS IAM Identity Center
Conclusion
References
Chapter 4: AWS Identity Center: Centralizing Access Management
Understanding AWS Identity Center
Best Practices and Advanced Features
Conclusion
Reference
Chapter 5: Infrastructure Protection on AWS
Core Infrastructure Protection Concepts
Creating VPCs and Subnets
Security Groups and Network Access Control Lists (NACLs)
Elastic Load Balancing Security
Adding AWS Network Firewall to Your VPC
Cleaning Up Your AWS Resources
Conclusion
References
Chapter 6: Threat Detection and Management on AWS
Introduction to Threat Detection
Diving into Threat-Detection Services with Amazon GuardDuty
AWS Security Hub Implementation
Threat-Detection Methodologies
Conclusion
References
Chapter 7: Data Security and Cryptography on AWS
Introduction to Data Security and Cryptography
Introduction to Encryption
Secrets Management with AWS Secrets Manager
Cryptographic Best Practices
, Cleaning Up Your Resources
Conclusion
References
Chapter 8: Monitoring, Logging, and Compliance on AWS
Overview
Core Concepts of Monitoring and Logging
Monitoring Network Traffic with VPC Flow Logs
Monitoring IAM Activity with CloudTrail
Centralized Security Dashboard Setup
Compliance Framework Examples
Best Practices for Monitoring and Logging in AWS Environments
Cleaning Up Your Resources
Conclusion
References
Chapter 9: Resilience and Recovery Strategies
Why Resilience and Recovery Matter to Cloud Security
Professionals
Understanding Recovery Objectives
Cleaning Up Your Resources
Conclusion
References
Chapter 10: Security Operations and Automation
The Evolution of Security Operations
Building Automated Security Controls
Security Operations Workflow
Implementing Different Types of Playbooks
Understanding Security Orchestration
Measuring Security Operations Effectiveness
Cleaning Up Your Resources