Join Sharif Nijim for an in-depth discussion in this video What you should know, part of Amazon Web Services: Enterprise Security.
- [Instructor] The AWS tool set can be seen as the operating system of the future. Selecting from the available network, compute, database, and storage components you can build a system to support any business requirement you may have. While no prior AWS knowledge is necessary for this course, it certainly doesn't hurt. Experience understanding server virtualization is useful. As is an understanding of Access controls and Identity Management. Think of this course as taking a selection of appetizer sized morsels from an overflowing AWS security buffet.
The themes of this course will resonate with existing enterprises. AWS is comprised of many, many service offerings. To give you an appreciation of what is available I will explore the security controls for the Simple Storage Service or S3. This will help you appreciate how complex operating in AWS can be. It also underscores the degree of granularity you can apply to permissions. At the end you should walk away ready to apply themes we will cover together to your own endeavors.
Let's get started.
Sharif Nijim couples pragmatic advice with practical examples that educate IT pros on how to create a secure infrastructure within Amazon Web Services. Sharif explores the shared responsibility model of security, which splits duties between your company and AWS, and introduces key identity and access management concepts, including users, groups, roles, and policies. Learn how to configure Identity and Access Manager (IAM) and Simple Storage Service (S3) access management, including policies and access control lists. At the end of the course, Sharif helps you prepare for the inevitable audit of your AWS account(s).
This course is also part of a series designed to help you prepare for the AWS Certified SysOps Administrator – Associate certification exam.
- The AWS shared responsibility model and security landscape
- Enabling CloudTrail
- Configuring AWS Identity and Access Management (IAM)
- Configuring IAM users, groups, and policies
- Granting temporary access
- Controlling access to Simple Storage Service (S3)
- Preparing for security audits
- Getting audit help from Trusted Advisor