• Complain

Dylan Shields - AWS Security

Here you can read online Dylan Shields - AWS Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Manning Publications Co., genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Dylan Shields AWS Security
  • Book:
    AWS Security
  • Author:
  • Publisher:
    Manning Publications Co.
  • Genre:
  • Year:
    2022
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

AWS Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "AWS Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

AWS Security covers best practices for access policies, data protection, auditing, continuous monitoring, and incident response.To create secure applications and infrastructure on AWS, you need to understand the tools and features the platform provides and learn new approaches to configuring and managing them. AWS Security provides comprehensive coverage of the key tools and concepts you can use to defend AWS-based systems.AWS Security covers best practices for access policies, data protection, auditing, continuous monitoring, and incident response. Through well-documented examples and procedures, youll explore several deliberately insecure applications, learning the exploits and vulnerabilities commonly used to attack them and the security practices to counter those attacks. With this practical primer, youll be well prepared to evaluate your systems security, detect threats, and respond with confidence.

Dylan Shields: author's other books


Who wrote AWS Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

AWS Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "AWS Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
inside front cover

AWS Security Dylan Shields To comment go to liveBook Manning Shelter Island - photo 1

Figure 11 The shared responsibility model Briefly the shared responsibility - photo 5

AWS Security

Dylan Shields

To comment go to liveBook

Figure 11 The shared responsibility model Briefly the shared responsibility - photo 6

Manning

Shelter Island

For more information on this and other Manning titles go to

www.manning.com

Copyright

For online information and ordering of these and other Manning books, please visit www.manning.com. The publisher offers discounts on these books when ordered in quantity.

For more information, please contact

Special Sales Department

Manning Publications Co.

20 Baldwin Road

PO Box 761

Shelter Island, NY 11964

Email: orders@manning.com

2022 by Manning Publications Co. All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps.

Recognizing the importance of preserving what has been written, it is Mannings policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15 percent recycled and processed without the use of elemental chlorine.

Figure 11 The shared responsibility model Briefly the shared responsibility - photo 7

Manning Publications Co.

20 Baldwin Road Technical

PO Box 761

Shelter Island, NY 11964

Development editors:

Helen Stergius and Toni Arritola

Technical development editor:

John Guthrie

Review editor:

Aleksandar Dragosavljevi

Production editor:

Deirdre S. Hiam

Copy editor:

Christian Berk

Proofreader:

Katie Tennant

Technical proofreader:

Borko Djurkovi

Typesetter:

Gordan Salinovi

Cover designer:

Marija Tudor

ISBN: 9781617297335

dedication

To Shannon

front matter
preface

When I first joined AWS, I knew almost nothing about security on the platform. I was fortunate to sit and talk with many of the different security teams and get an introduction to everything AWS security. I remember one of the teams I met with early on was the Automated Reasoning Group. They built several security tools based on automated reasoning, but one really stood out to me: Zelkova. At the time, you could give it two IAM policies, and it would tell if they were effectively the same or if one was more permissive (or not comparable). The tool does much more now, and powers features in S3, Config, GuardDuty, and Trusted Advisor. But even back then, it was an incredible tool. The team had many examples of IAM policies that had unexpected behavior that wasnt obvious by just reading them. Then, they showed how you could easily identify the issues with Zelkova.

I remember being so excited after that demo that I talked about it to everyone I knew who used AWS. But instead of excitement, I mostly got questions. And not questions about Zelkova but basic questions about IAM, like Whats a resource policy? IAM, like a lot of security tools on AWS, is necessarily complicated. And for most people, the information on how these services work isnt readily discoverable. Sure, theres documentation on resource policies, but you wouldnt know to look for it if you didnt know that it exists. That was when I first thought about writing this book. I had been given a crash course in AWS security by learning from the people who were building all of these tools and services, and I wanted to find a way to share this information with everyone outside of the company who doesnt have the same access.

AWS and cloud computing in general are growing nonstop, and security is such an important piece of it that I find this topic almost inescapable. Even while working at other companies that dont use AWS for their primary infrastructure, AWS security knowledge has still come in handy. In my current role at Facebook, I review security and privacy concerns for companies we acquire, and almost all of them run on AWS. Its getting harder and harder to find organizations that dont use AWS in some way or another. Part of the growth of the platform is due to how fast AWS pushes out new features and services. Theyre constantly improving and making it easier to build new things. But every new addition makes the platform a little more complex and makes securing it just a little bit harder. I hope the information in this book will help you to navigate that complexity and better secure the applications you run on AWS.

acknowledgments

Over the last couple years, Ive learned how hard it is to write a book and that you cant do it without a great deal of support from others. Id like to thank those people who helped me get to this point.

I have to start by thanking you, my wife, Shannon. Thank you for supporting me throughout the whole process and for encouraging me whenever I felt like I couldnt do it.

Thank you, the incredible leaders I worked for in AWS Security, who brought me into the space and helped me get started: Chris Kasprowicz, Eric Schultze, and Andrew Doane. Thank you, Ralph Flora, Yogesh Pandey, Anand Sharma, Sandeep Lagisetty, Craig Pearce, Ely Kahn, and everyone else I worked with at AWS who taught me everything I know about cloud security.

Id also like to thank my editors at Manning: Susan Ethridge, Helen Stergius, and Toni Arritola. Thank you for everything youve taught me about writing. Thank you for wanting to make this a great book and for pushing to make that happen. I couldnt have done this without all of your support. Thanks as well go to John Guthrie, the technical editor. I cant thank you enough for all of your comments. I appreciated you being a sounding board, especially in the early chapters when I was trying to find my footing. Thank you, everyone else at Manning: Deirdre Hiam, my project editor; Christian Berk, my copyeditor; and Katie Tennant, my proofreader.

Thank you, everyone who read the manuscript while it was in progress: Alex Lucas, Amado Gramajo, Antonio Pessolano, Borko Djurkovic, Bryan Miller, Burkhard Nestmann, David Hartley, Enrico Mazzarella, Hilde Van Gysel, Ilya Sakayev, Jeremy Chen, Jrg Discher, Jorge Ezequiel Bo, Kelly E. Hair, Michael Langdon, Peter Singhof, Sanjeev Jaiswal, Sau Fai Fong, Sbastien Portebois, Shawn P. Bolan, Thorsten Weber, Tony Mullen, Tyler Flaagan, Victor Durn, Wendell Beckwith, and Yakov Boglev. Thank you for taking the time to help shape this project. Its a better book for all of your comments. Thank you, the MEAP readers, who posted questions and comments in the forum.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «AWS Security»

Look at similar books to AWS Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «AWS Security»

Discussion, reviews of the book AWS Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.