Summary

In this lesson, we learned about securing applications that are built on top of AWS resources. We went through WAF in detail to protect web applications in AWS and learned about the benefits and lifecycle of Web Application Firewall. We also walked through the process of automating security with WAF.

Furthermore, we went through the process of signing AWS API requests for securing data in transit along with securing information stored in API itself.

Lastly, we learned about two AWS services that are used by developers to secure their web and mobile applications--Amazon Cognito for user management and Amazon API Gateway for managing and securing APIs.

In the next lesson, AWS Security Best Practices, we will learn about AWS security best practices. It will be a culmination of all that we have learned so far in all the previous lessons regarding security in AWS. We will learn about solutions to ensure that best practices are met for all topics such as IAM, VPC, security of data, security of servers, and so on.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.217.5