firewall
prevent unauthorized access to your networks by inspecting incoming and outgoing traffic against security rules you’ve defined.
WAF
Web Application Firewall
Where are some areas you can deploy WAF to?
- Cloud Front as part of your CDN solution
DDoS
Distributed Denial of Service
-hacker uses bots to send large quantity of requests, causing a traffic jam on a website or web
application in an attempt to cause it to crash.
Shield
a managed Distributed Denial of Service (DDoS) protection service
What are differences between Shield Standard and Shield Advanced
Standard: free, protect against most common attacks
Advanced: additional fee, advanced attack protection, real-time notifications via CloudWatch, 24/7 expert support to assist while an attack is happening
Which services is Shield Advanced supported on?
Macie
helps find sensitive PII data stored on S3 (credit cards, social security numbers, passport numbers)
Config
allows you to assess, audit, and evaluate the configurations of your resources - track config changes over time - delivers config history file to S3 - view network, OS, system updates, etc.
Guard Duty
an intelligent threat detection system that uncovers unauthorized behavior - uses machine learning - built-in detection for EC2, D3 and IAM - Reviews CloudTrail, VPC Flow Logs, and DNS logs
Inspector
installed on EC2 instances
Artifact
offers on-demand access to a central repository for your security and compliance reports.
- 3rd party compliance testing reorts
Service Organization Controls
- Payment Card Industry (PCI) reports, etc.
KMS
Key Management Service
- AWS manages your keys for you
use case for KMS
create encrypted Amazon EBS volumes
CloudHSM
a Hardware Security Module used to generate encryption keys
Secrets Manager
allows you to manage & retrieve secrets via an API call so you don’t store them in config files
secrets
passwords and keys