Some of the most commonly heard reasons for why a company can’t move to the cloud are concerns around security: “Our data is too sensitive to put in the cloud.”; “We can only trust servers that are in our data centers.”; “We can’t trust someone else with the security of our system”.
In reality, a cloud-based system often provides a more secure environment than an equivalent on-premise solution. How can this be? Well, cloud providers hire highly experienced security experts to help build their security capabilities, so by moving to the cloud, you too can use these security capabilities created by experts without having to be an expert yourself!
The key to achieving this is understanding the sophisticated tools made available to you by the cloud vendor, and the key to understanding is right here in this course! This course discusses the security capabilities available to users of AWS, and best practices for utilizing those capabilities. When finished with this course, you will have a solid understanding of the Shared Responsibility Model that is at the heart of AWS security patterns, along with how to employ basic security best practices such as the principle of least privilege.
This course will explore the theory behind various security topics, as well as provide examples of how those topics can be put to use within the AWS Cloud ecosystem. We’ll focus on explaining these best practices, and how to apply them to keep your applications well protected. The end result is a more secure system – more secure than even your own data center.
- Demonstrate an understanding of the principle of shared responsibility and how it applies to AWS and you.
- Demonstrate an understanding of authentication and authorization best practices.
- Understand security at various layers including infrastructure, operating system, data and application .
- Learn how to detect threats and intrusions.
- Learn to create policies and enforce their requirements.
06 — INTENDED AUDIENCE
- Security engineers concerned about building cloud-based applications securely.
- Operations engineers tasked with creating a secure cloud production environment.
- Technical management who wants to understand the principles and best practices involved in maintaining a secure cloud-based application.