From the course: Complete Guide to the AWS Well-Architected Framework
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Auditing and notifications - Amazon Web Services (AWS) Tutorial
From the course: Complete Guide to the AWS Well-Architected Framework
Auditing and notifications
- [Instructor] There are a number of key AWS services that you can consider for helping you manage your security, for auditing and for notification when things go awry. First up, AWS config. This is a service that allows you to define parameters for what should be checked and how you should be notified. These are checks for the resources in your AWS account, your networks, your EC2 instances, your security groups, everything in your stack IE infrastructure. Once you define your rules AWS, either on a schedule or when there are changes, will check the configuration of the resources and let you know if there's an issue. So it's doing an audit of your account and will also notify you when something's awry. Now, how does it work? Well, you have to tag your resources. A tag is just a descriptor, a key value that describes the actual resource. And when you create any AWS resource, you have the opportunity of adding tags to that resource. So config swings into action. Looking at the…
Contents
-
-
-
-
-
-
(Locked)
Security pillar overview2m 21s
-
(Locked)
Design principles7m 14s
-
(Locked)
Identity and Access Management2m 59s
-
(Locked)
Demo: IAM security overview4m 51s
-
(Locked)
Protecting AWS credentials3m 54s
-
(Locked)
Identify threats: Detective controls3m 25s
-
(Locked)
AWS detective controls for security4m 29s
-
(Locked)
Implement an auditing workflow3m 37s
-
(Locked)
Challenge: Review a CloudTrail event56s
-
(Locked)
Solution: Review a CloudTrail event1m 23s
-
(Locked)
Auditing and notifications4m 46s
-
(Locked)
Infrastructure protection4m 57s
-
(Locked)
Key AWS services for infrastructure protection5m 55s
-
(Locked)
Data protection methods2m 18s
-
(Locked)
Key AWS services for data protection3m 15s
-
(Locked)
Protecting your data at rest at AWS1m 50s
-
(Locked)
Protecting data in transit at AWS2m 43s
-
(Locked)
Responding to security incidents2m 33s
-
(Locked)
Managing incident response4m 27s
-
(Locked)
Demo: Using the Well-Architected Tool2m 12s
-
(Locked)
-
-
-
-
-