In this video, you will learn how to use the AWS Trusted Advisor. With recommendations for cost optimization, performance, fault tolerance, and security, you will gain an understanding of the differences in what Trusted Advisor provides between free and paid AWS support plans. We will then go in and look into the security recommendations section.
- [Voiceover] AWS has built a tool called Trusted Advisor…into the Web Console…to help you operate your AWS account…as efficiently as possible.…Let's explore what Trusted Advisor can do for you…and look deeply into it's security recommendations.…Trusted Advisor is available for free…in every AWS account.…With business level paid support,…Trusted Advisor offers comprehensive…best practices checks against your account.…Without a paid support plan,…the checks are less complete.…Currently, Trusted Advisor offers insights…into four major categories.…
Cost optimization,…performance,…fault tolerance,…and security.…Let's explore the cost optimization portion…of Trusted Advisor.…At the free tier,…no cost optimization checks are included.…With a paid plan,…the cost optimization section looks for AWS compute…and network resources in your account…that aren't being heavily used.…For example, suppose there is an EC2 instance…in your account with consistently low CPU utilization.…Trusted Advisor would flag that instance…for your review as you might save money…
Sharif Nijim couples pragmatic advice with practical examples that educate organizations on how to create a secure infrastructure within Amazon Web Services. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key identity and access management concepts: users, groups, roles, and policies. At the end of the course, he helps you prepare for the inevitable audit of your AWS account(s).
- The AWS shared responsibility model and security landscape
- Enabling CloudTrail
- Configuring AWS Identity and Access Management (IAM)
- Troubleshooting IAM policies
- Granting temporary access
- Incorporating least privilege
- Controlling access to Simple Storage Service (S3)
- Preparing for security audits
- Getting audit help from Trusted Advisor