Join Sharif Nijim for an in-depth discussion in this video What you should know, part of Amazon Web Services: Enterprise Security (2016).
- [Voiceover] The AWS tool set can be seen as the operating system of the future. Selecting from the available network, compute, database and storage components, you can build a system to support any business requirement you may have. While no prior AWS knowledge is necessary for this course, it certainly doesn't hurt. Experience understanding server virtualization is useful, as is an understanding of Access controls and Identity management. Think of this course as taking a selection of appetizer-sized morsels from an overflowing AWS security buffet.
The themes of this course will resonate with existing enterprises. AWS is comprised of many, many service offerings. To give you an appreciation of what is available, I will explore the security controls for the Simple Storage Service, or S3. This will help you appreciate how complex operating in AWS can be. It also underscores the degree of granularity you can apply to permissions. At the end, you should walk away ready to apply themes we will cover together to your own endeavors.
Let's get started.
Sharif Nijim couples pragmatic advice with practical examples that educate organizations on how to create a secure infrastructure within Amazon Web Services. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key identity and access management concepts: users, groups, roles, and policies. At the end of the course, he helps you prepare for the inevitable audit of your AWS account(s).
- The AWS shared responsibility model and security landscape
- Enabling CloudTrail
- Configuring AWS Identity and Access Management (IAM)
- Troubleshooting IAM policies
- Granting temporary access
- Incorporating least privilege
- Controlling access to Simple Storage Service (S3)
- Preparing for security audits
- Getting audit help from Trusted Advisor