- 1 Апр 2022
Learn what cloud security is all about and how to use the principle of shared responsibility to build a secure environment for your applications within the AWS Cloud ecosystem.
ABOUT THE COURSE
Some of the most commonly heard reasons for why a company can’t move to the cloud are concerns around security: “Our data is too sensitive to put in the cloud.”; “We can only trust servers that are in our data centers.”; “We can’t trust someone else with the security of our system”.
In reality, a cloud-based system often provides a more secure environment than an equivalent on-premise solution. How can this be? Well, cloud providers hire highly experienced security experts to help build their security capabilities, so by moving to the cloud, you too can use these security capabilities created by experts without having to be an expert yourself!
The key to achieving this is understanding the sophisticated tools made available to you by the cloud vendor, and the key to understanding is right here in this course! This course discusses the security capabilities available to users of AWS, and best practices for utilizing those capabilities. When finished with this course, you will have a solid understanding of the Shared Responsibility Model that is at the heart of AWS security patterns, along with how to employ basic security best practices such as the principle of least privilege.
This course will explore the theory behind various security topics, as well as provide examples of how those topics can be put to use within the AWS Cloud ecosystem. We’ll focus on explaining these best practices, and how to apply them to keep your applications well protected. The end result is a more secure system – more secure than even your own data center.
- Demonstrate an understanding of the principle of shared responsibility and how it applies to AWS and you.
- Demonstrate an understanding of authentication and authorization best practices.
- Understand security at various layers including infrastructure, operating system, data and application .
- Learn how to detect threats and intrusions.
- Learn to create policies and enforce their requirements.
06 — INTENDED AUDIENCE
- Security engineers concerned about building cloud-based applications securely.
- Operations engineers tasked with creating a secure cloud production environment.
- Technical management who wants to understand the principles and best practices involved in maintaining a secure cloud-based application.
Lee Atchison is the Senior Director, Cloud Architecture at New Relic. He’s been with New Relic for seven years where he led the building of the New Relic infrastructure products, and helped New Relic architect a solid service-based system. Lee has 31 years of industry experience, and learned cloud-based, scalable systems during his seven years as a Senior Manager at Amazon.com, where among other things he led the creation of AWS Elastic Beanstalk. Lee is the author of the book “Architecting for Scale”, published in 2016 by O’Reilly Media.