AWS Cloud Security Best Practices

Security is job zero. Start out on the right foot with AWS Security Checklist. Learn the basics for securing your OS to live in EC2, understand why infrastructure segmentation is critical for security, and move your org to the cloud with the AWS CAF.
Course info
Rating
(29)
Level
Intermediate
Updated
Sep 17, 2019
Duration
42m
Table of contents
Description
Course info
Rating
(29)
Level
Intermediate
Updated
Sep 17, 2019
Duration
42m
Description

Prevent a breach of security. Protect against data loss or misuse. Keep from ruining your company's reputation. Keep the hackers out! In this course, AWS Cloud Security Best Practices, you will gain the ability to secure your organization’s AWS cloud applications. First, you will learn the fundamentals in the AWS Security Checklist. Next, you will discover what is needed for an operating system to run securely in the cloud, and how to segment AWS infrastructure for maximum security. Finally, you will explore how the AWS Cloud Adoption Framework (CAF) can help your organization move the entire business to the cloud. When you're finished with this course, you will have the skills and knowledge of AWS Security needed to secure your organization’s applications in the cloud.

About the author
About the author

Joseph Hunsaker is a Sr. Software Engineer for DSCO and an AWS consultant. He is the Developer Advocate for DSCO's open source LeoPlatform. He has consulted for financial companies from the Fortune 500 and for the United States Armed Forces. You can reach him on Twitter @seriouscoderone

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name's Joseph Hunsaker, and welcome to my course, AWS Cloud Security Best Practices. I'm a senior software engineer at DSCO. I have consulted with Fortune 500 finance companies and traveled around the globe, contracting with the United States Armed Forces, where security is a big deal. Throughout this course, I will be drawing on analogies from my experiences while contracting in Afghanistan. At AWS, they like to say, security is job 0, by which they mean that it is even more important than your company's number 1 priority. In this course, we will learn how to secure your operating systems and infrastructure. Some of the major topics that we will cover include checking off the security basics with the AWS security checklist, understanding what it will take to secure an Amazon machine image, properly segment AWS infrastructure for maximum security, a quick introduction to the AWS Cloud Adoption Framework, or CAF. By the end of this course, you'll know how to create secure AMIs and use AWS networking features to segment your infrastructure into security zones where you can apply the security controls needed to fit your business's security requirements. Before beginning this course, you should be generally familiar with Amazon networking capabilities. I hope you'll join me on this journey to learn how to secure your operating systems and infrastructure with AWS Cloud Security Best Practices at Pluralsight.