From the course: AWS Well-Architected Framework: Security Pillar
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Managing incident response - Amazon Web Services (AWS) Tutorial
From the course: AWS Well-Architected Framework: Security Pillar
Managing incident response
- [Instructor] When it comes to managing a response to a security breach or incident, we also have to take a look at how Amazon architects their services to actually handle when they get under attack. Because of course, when they get under attack, we get under attack. First up, a managed service, regardless of the managed service, is a massive server farm. That massive server farm is spread typically across a number of buildings within the region. The service is monitored. If it's under attack, it scales out. So it can scale on demand to get bigger, particularly public-facing services like the API gateway, or load balancers, or S3 storage. If anything gets under attack at AWS, it has to respond. So it has to scale bigger, and that's just what it does. So using an Elastic Load Balancer to front your application can help mitigate attacks because it's built to be under unexpected load. And hopefully your application sitting…
Contents
-
-
-
-
-
-
(Locked)
Data protection methods2m 18s
-
Key AWS services for data protection3m 15s
-
(Locked)
Protecting your data at rest at AWS1m 50s
-
(Locked)
Protecting data in transit at AWS2m 43s
-
(Locked)
Responding to security incidents2m 33s
-
(Locked)
Managing incident response4m 27s
-
(Locked)
Demo: Using the Well-Architected tool2m 9s
-
(Locked)
-