Preface Acknowledgments Chapter 1: Introduction to Cloud Security Chapter 2: AWS Security Fundamentals Chapter 3: Identity and Access Management on AWS Chapter 4: AWS Identity Center: Centralizing Access Management Chapter 5: Infrastructure Protection on AWS Chapter 6: Threat Detection and Management in AWS Chapter 7: Data Security and Cryptography on AWS Chapter 8: Monitoring, Logging, and Compliance on AWS Chapter 9: Resilience and Recovery Strategies Chapter 10: Security Operations and Automation Chapter 11: Applying the Developer Mindset to AWS Security Chapter 12: Implementing GitOps for AWS Infrastructure IndexPreface Acknowledgments Chapter 1: Introduction to Cloud Security Chapter 2: AWS Security Fundamentals Chapter 3: Identity and Access Management on AWS Chapter 4: AWS Identity Center: Centralizing Access Management Chapter 5: Infrastructure Protection on AWS Chapter 6: Threat Detection and Management in AWS Chapter 7: Data Security and Cryptography on AWS Chapter 8: Monitoring, Logging, and Compliance on AWS Chapter 9: Resilience and Recovery Strategies Chapter 10: Security Operations and Automation Chapter 11: Applying the Developer Mindset to AWS Security Chapter 12: Implementing GitOps for AWS Infrastructure Index Preface Preface Preface Acknowledgments Chapter 1: Introduction to Cloud Security Chapter 2: AWS Security Fundamentals Chapter 3: Identity and Access Management on AWS Chapter 4: AWS Identity Center: Centralizing Access Management Chapter 5: Infrastructure Protection on AWS Chapter 6: Threat Detection and Management in AWS Chapter 7: Data Security and Cryptography on AWS Chapter 8: Monitoring, Logging, and Compliance on AWS Chapter 9: Resilience and Recovery Strategies Chapter 10: Security Operations and Automation Chapter 11: Applying the Developer Mindset to AWS Security Chapter 12: Implementing GitOps for AWS Infrastructure Index Preface Acknowledgments Chapter 1: Introduction to Cloud Security Chapter 2: AWS Security Fundamentals Chapter 3: Identity and Access Management on AWS Chapter 4: AWS Identity Center: Centralizing Access Management Chapter 5: Infrastructure Protection on AWS Chapter 6: Threat Detection and Management in AWS Chapter 7: Data Security and Cryptography on AWS Chapter 8: Monitoring, Logging, and Compliance on AWS Chapter 9: Resilience and Recovery Strategies Chapter 10: Security Operations and Automation Chapter 11: Applying the Developer Mindset to AWS Security Chapter 12: Implementing GitOps for AWS Infrastructure Index Preface ix Acknowledgments xi Chapter 1: Introduction to Cloud Security 1 Chapter 2: AWS Security Fundamentals 7 Chapter 3: Identity and Access Management on AWS 27 Chapter 4: AWS Identity Center: Centralizing Access Management 63 Chapter 5: Infrastructure Protection on AWS 85 Chapter 6: Threat Detection and Management in AWS 141 Chapter 7: Data Security and Cryptography on AWS 165 Chapter 8: Monitoring, Logging, and Compliance on AWS 207 Chapter 9: Resilience and Recovery Strategies 265
Securing the AWS® Cloud : A Guide for Learning to Secure AWS Infrastructure