Cargando…

AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS

AWS Security Cookbook lists all the practical solutions to the common problems faced by individuals or organizations in securing their instances. Here readers will learn to troubleshoot security concerns and understand additional patterns and services for securing AWS infrastructure.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: HEARTIN KANIKATHOTTU
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] PACKT Publishing, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Dedication
  • About Packt
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: Managing AWS Accounts with IAM and Organizations
  • Technical requirements
  • Configuring IAM for a new account
  • Getting ready
  • How to do it ...
  • Creating a billing alarm
  • How it works ...
  • There's more ...
  • See also
  • Creating IAM policies
  • Getting ready
  • How to do it ...
  • Creating policies with the IAM visual editor
  • Creating policies using the AWS CLI
  • How it works ...
  • There's more ...
  • See also
  • Creating a master account for AWS Organizations
  • Getting ready
  • How to do it ...
  • How it works ...
  • There's more ...
  • See also
  • Creating a new account under an AWS Organization
  • Getting ready
  • How to do it ...
  • Creating an account and OU from the CLI
  • Creating and moving an account from the console
  • How it works ...
  • There's more ...
  • See also
  • Switching roles with AWS Organizations
  • Getting ready
  • How to do it ...
  • Switching as an administrator
  • Granting permission for a non-admin user to switch roles
  • Granting permission for a non-admin user to switch roles using the CLI
  • How it works ...
  • Switching roles between any two accounts
  • There's more ...
  • See also
  • Chapter 2: Securing Data on S3 with Policies and Techniques
  • Technical requirements
  • Creating S3 access control lists
  • Getting ready
  • How to do it ...
  • Granting READ ACLs for a bucket to everyone from the console
  • Granting READ for AWS users using predefined groups from the CLI
  • Granting public READ for an object with canned ACLs from the CLI
  • How it works ...
  • There's more ...
  • Comparing ACLs, bucket policies, and IAM policies
  • See also
  • Creating an S3 bucket policy
  • Getting ready
  • How to do it ...
  • Bucket public access with a bucket policy from the console
  • Bucket list access with a bucket policy from the CLI
  • How it works ...
  • There's more ...
  • See also
  • S3 cross-account access from the CLI
  • Getting ready
  • How to do it ...
  • Uploading to a bucket in another account
  • Uploading to a bucket in another account with a bucket policy
  • How it works ...
  • There's more ...
  • See also
  • S3 pre-signed URLs with an expiry time using the CLI and Python
  • Getting ready
  • How to do it ...
  • Generating a pre-signed URL from the CLI
  • Generating a pre-signed URL using the Python SDK
  • How it works ...
  • There's more ...
  • See also
  • Encrypting data on S3
  • Getting ready
  • How to do it ...
  • Server-side encryption with S3-managed keys (SSE-S3)
  • Server-side encryption with KMS-managed keys (SSE-KMS)
  • Server-side encryption with customer-managed keys (SSE-C)
  • How it works ...
  • There's more ...
  • See also
  • Protecting data with versioning
  • Getting ready
  • How to do it ...
  • How it works ...
  • There's more ...
  • See also