Chapter 1. A new way of operating
Chapter 1. Cloud-native security tools
Chapter 1. Conclusion
Chapter 1. Introduction to AWS security
Chapter 1. Summary
Chapter 2. Attribute-based access control with tags
Chapter 2. Identity and access management
Chapter 2. Summary
Chapter 2. Using common patterns in AWS IAM
Chapter 3. Integration with existing access management systems
Chapter 3. Managing accounts
Chapter 3. Summary
Chapter 4. Applying least privilege access control
Chapter 4. Choosing between short- and long-lived credentials
Chapter 4. Policies and procedures for secure access
Chapter 4. Reviewing IAM permissions
Chapter 4. Summary
Chapter 5. Securing the network The virtual private cloud
Chapter 5. Separating private networks
Chapter 5. Summary
Chapter 5. Traffic routing and virtual firewalls
Chapter 6. Blocking malicious traffic with AWS Web Application Firewall
Chapter 6. Integrating third-party firewalls
Chapter 6. Network access protection beyond the VPC
Chapter 6. Protecting against distributed denial of service attacks using AWS Shield
Chapter 6. Summary
Chapter 7. Data access logging
Chapter 7. Data classification
Chapter 7. Protecting data in the cloud
Chapter 7. Securing data at rest
Chapter 7. Securing data in transit
Chapter 7. Summary
Chapter 8. Centralizing application logs
Chapter 8. Logging and audit trails
Chapter 8. Summary
Chapter 8. Tracking resource configuration changes
Chapter 9. Continuous monitoring
Chapter 9. Detecting threats in logs
Chapter 9. Host vulnerability scanning
Chapter 9. Summary
Chapter 10. Automating incident response
Chapter 10. Incident response and remediation
Chapter 10. Incident response planning
Chapter 10. Summary
Chapter 11. Implementing authentication and authorization end to end
Chapter 11. Protecting data
Chapter 11. Securing a real-world application
Chapter 11. Strong authentication and access controls
Chapter 11. Summary
Chapter 11. Web application firewalls