For each of the AWS services that I have touched on so far, there are numerous best practices to follow and recommendations to adhere to when architecting your environments. These best practices are defined to allow you to follow tried and tested processes and procedures that optimize your solutions, ensuring that security is built in at every layer of your architecture and minimizing the risk of security vulnerabilities and exposures.
Within this chapter, we shall review some of the common security best practices that should be implemented where possible. I will also dive into AWS Trusted Advisor, which automatically highlights any deviation from a number of security best practices as defined by AWS. Finally, we shall take a closer look at penetration testing in AWS.
The following topics will be covered in this chapter:
- Common...