+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Securing the AWS Cloud. A Guide for Learning to Secure AWS Infrastructure. Edition No. 1. Tech Today

  • Book

  • 384 Pages
  • May 2025
  • John Wiley and Sons Ltd
  • ID: 5989320
Make your next Amazon Web Services deployment secure and private

Dive into the world of cloud security with Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Brandon Carroll, a comprehensive guide crafted for those eager to fortify their Amazon Web Services (AWS) deployments. Whether you are starting from scratch or looking to enhance an existing setup, this book serves as your essential roadmap to understanding and implementing robust security measures in the AWS environment.

The author, a seasoned infrastructure security expert, begins with the basics of cybersecurity and gradually introduces more complex AWS-specific security practices. His structured approach helps you use your existing knowledge to effectively secure your AWS cloud. The book navigates through a series of real-world challenges and provides actionable solutions, equipping you with the skills needed to tackle security issues head-on.

You'll: - Learn foundational security practices to safeguard your AWS environment right from the start. - Master advanced techniques for identity management, threat detection, and data security within AWS. - Develop resilience and recovery strategies to maintain robust security and ensure business continuity.

Securing the AWS Cloud is the ideal resource for IT professionals, system administrators, and anyone aspiring to specialize in cloud security. It's tailor-made to enhance your ability to deploy secure, reliable, and private AWS solutions consistently. If you're ready to take your AWS security skills to the next level, don't wait. Buy your copy today and start building a safer cloud environment!

Table of Contents

Preface

Acknowledgments

Chapter 1: Introduction to Cloud Security

Chapter 2: AWS Security Fundamentals

Chapter 3: Identity and Access Management on AWS

Chapter 4: AWS Identity Center: Centralizing Access Management

Chapter 5: Infrastructure Protection on AWS

Chapter 6: Threat Detection and Management in AWS

Chapter 7: Data Security and Cryptography on AWS

Chapter 8: Monitoring, Logging, and Compliance on AWS

Chapter 9: Resilience and Recovery Strategies

Chapter 10: Security Operations and Automation

Chapter 11: Applying the Developer Mindset to AWS Security

Chapter 12: Implementing GitOps for AWS Infrastructure

IndexPreface  Acknowledgments  Chapter 1: Introduction to Cloud Security  Chapter 2: AWS Security Fundamentals  Chapter 3: Identity and Access Management on AWS  Chapter 4: AWS Identity Center: Centralizing Access Management  Chapter 5: Infrastructure Protection on AWS  Chapter 6: Threat Detection and Management in AWS  Chapter 7: Data Security and Cryptography on AWS  Chapter 8: Monitoring, Logging, and Compliance on AWS  Chapter 9: Resilience and Recovery Strategies  Chapter 10: Security Operations and Automation  Chapter 11: Applying the Developer Mindset to AWS Security  Chapter 12: Implementing GitOps for AWS Infrastructure  Index Preface Preface Preface  Acknowledgments  Chapter 1: Introduction to Cloud Security  Chapter 2: AWS Security Fundamentals  Chapter 3: Identity and Access Management on AWS  Chapter 4: AWS Identity Center: Centralizing Access Management  Chapter 5: Infrastructure Protection on AWS  Chapter 6: Threat Detection and Management in AWS  Chapter 7: Data Security and Cryptography on AWS  Chapter 8: Monitoring, Logging, and Compliance on AWS  Chapter 9: Resilience and Recovery Strategies  Chapter 10: Security Operations and Automation  Chapter 11: Applying the Developer Mindset to AWS Security  Chapter 12: Implementing GitOps for AWS Infrastructure  Index Preface  Acknowledgments  Chapter 1: Introduction to Cloud Security  Chapter 2: AWS Security Fundamentals  Chapter 3: Identity and Access Management on AWS  Chapter 4: AWS Identity Center: Centralizing Access Management  Chapter 5: Infrastructure Protection on AWS  Chapter 6: Threat Detection and Management in AWS  Chapter 7: Data Security and Cryptography on AWS  Chapter 8: Monitoring, Logging, and Compliance on AWS  Chapter 9: Resilience and Recovery Strategies  Chapter 10: Security Operations and Automation  Chapter 11: Applying the Developer Mindset to AWS Security  Chapter 12: Implementing GitOps for AWS Infrastructure  Index Preface ix Acknowledgments xi Chapter 1: Introduction to Cloud Security 1 Chapter 2: AWS Security Fundamentals 7 Chapter 3: Identity and Access Management on AWS 27 Chapter 4: AWS Identity Center: Centralizing Access Management 63 Chapter 5: Infrastructure Protection on AWS 85 Chapter 6: Threat Detection and Management in AWS 141 Chapter 7: Data Security and Cryptography on AWS 165 Chapter 8: Monitoring, Logging, and Compliance on AWS 207 Chapter 9: Resilience and Recovery Strategies 265 Chapter 10: Security Operations and Automation 285 Chapter 11: Applying the Developer Mindset to AWS Security 317 Chapter 12: Implementing GitOps for AWS Infrastructure 335 Index 367

Authors

Brandon Carroll