Summary
This chapter has built on Chapter 5’s foundations, covering how to improve security for a solution already in place on AWS. You examined how you can monitor the existing environment for vulnerabilities and how you can address the most common security issues. Then, you explored remediation techniques in terms of how to improve the detection of vulnerabilities and automate responses to such issues to improve your solution’s security posture.
In the next chapter, you will look at the various aspects of improving your deployment.