Summary
This chapter has covered quite a lot of ground in terms of designing secure solutions on AWS.
You learned how to leverage IAM and identity federation in your solution to provide granular access control. You then looked at the best practices to protect your infrastructure resources—using tools such as AWS WAF, AWS Shield, and AWS Firewall Manager—and your data using encryption at rest with AWS KMS and enforcing encryption in transit. The chapter then concluded with a discussion on incident detection and response to prepare for worst-case scenarios, leveraging tools such as AWS CloudTrail, AWS Config, Amazon GuardDuty, AWS Security Hub, and Amazon EventBridge.
In Chapter 6, Meeting Reliability Requirements, we will dive into the best practices for designing and implementing reliable solutions on AWS.