AWS places a strong emphasis on security, providing a robust foundation for building secure applications and workloads. However, it's essential to understand the ๐๐ต๐ฎ๐ฟ๐ฒ๐ฑ ๐ฟ๐ฒ๐๐ฝ๐ผ๐ป๐๐ถ๐ฏ๐ถ๐น๐ถ๐๐ ๐บ๐ผ๐ฑ๐ฒ๐น:
๐๐ช๐ฆ ๐ฅ๐ฒ๐๐ฝ๐ผ๐ป๐๐ถ๐ฏ๐ถ๐น๐ถ๐๐: Securing the underlying cloud infrastructure (hardware, virtualization, networking, etc.).
๐ฌ๐ผ๐๐ฟ ๐ฅ๐ฒ๐๐ฝ๐ผ๐ป๐๐ถ๐ฏ๐ถ๐น๐ถ๐๐: Securing the workloads running on the AWS infrastructure (operating systems, applications, data, etc.).
๐๐ฒ๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐ฎ๐๐๐ฟ๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ๐:
๐๐ฑ๐ฒ๐ป๐๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐ (๐๐๐ ): Centralized control of user access to AWS resources, Multi-factor authentication (MFA), Role-based access control (RBAC).
๐ข๐ฟ๐ด๐ฎ๐ป๐ถ๐๐ฎ๐๐ถ๐ผ๐ป๐: Consolidate and manage multiple AWS accounts under a single umbrella. Set permissions boundaries using Service Control Policies (SCPs) to prevent unauthorized access and actions.
๐ง๐ฟ๐๐๐๐ฒ๐ฑ ๐๐ฑ๐๐ถ๐๐ผ๐ฟ: Helps to optimize AWS environment by providing real-time recommendations across several key areas such as cost optimization, performance, security etc.
๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฟ๐ผ๐๐ฝ๐: Act as virtual firewalls for EC2 instances.
๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ๐ป๐๐ฟ๐ผ๐น ๐๐ถ๐๐๐ (๐ก๐๐๐๐): Control inbound and outbound traffic for subnets.
๐ช๐๐: Protects web applications from common web exploits.
๐๐ฒ๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐ ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ (๐๐ ๐ฆ): Manages and controls cryptographic keys.
๐๐บ๐ฎ๐๐ผ๐ป ๐๐ป๐๐ฝ๐ฒ๐ฐ๐๐ผ๐ฟ: Automatically assesses application vulnerabilities.
๐๐น๐ผ๐๐ฑ๐ง๐ฟ๐ฎ๐ถ๐น: Records AWS API calls for auditing and compliance.
๐๐๐ฎ๐ฟ๐ฑ๐๐๐๐: Threat detection service for malicious activity.
๐๐ผ๐ป๐ณ๐ถ๐ด: Tracks configuration changes to AWS resources.
๐ฆ๐ต๐ถ๐ฒ๐น๐ฑ: Protects against DDoS attacks.
๐๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฐ๐ฎ๐๐ฒ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐ฟ: Manages SSL/TLS certificates.
๐ฆ๐ฒ๐ฐ๐ฟ๐ฒ๐๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐ฟ: Helps to securely store and retrieve sensitive information such as database credentials, API keys, OAuth tokens, and other secrets.
๐๐น๐ผ๐๐ฑ๐๐ฆ๐ : Provides hardware security modules (HSMs) for generating and storing cryptographic keys.
๐๐ช๐ฆ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐๐ฏ: It is a cloud security posture management (CSPM) service that performs security best practice checks, aggregates alerts, and enables automated remediation.
Top comments (0)