To help you configure, secure, and protect your AWS environment against both internal and external threats, there are a number of security best practices that you can adhere to that will help you maintain a high level of control across your environment. This chapter will focus on some of those best practices and how you can use them in your daily operations when running workloads across AWS.
I have always said that it is very easy to deploy resources within AWS, often with just a few simple clicks within the AWS Management Console, or a few commands run at the AWS CLI level. Either way, deploying the resources is the easy part, architecting and maintaining a strict level of access control, data protection, and availability is a different matter. Any data, service, or application running in AWS needs to be protected and secured if you want to minimize...