In Chapter 4, Server Hardening, you understood the principles and best practices of designing network infrastructure and implementing server hardening rules.
Although these controls will help us protect our side, if a user logs in through an unsecured network, then the account can always be compromised.
In this chapter, we will discuss the science of secure communications. We will be begin with revising the basics and then moving on to other, detailed topics. Topics that we will be covering are:
- Introduction to cryptography
- Hardware Security Modules
- Key Management Service
- Deployment of CredStash
- SSL/TLS in great detail
- AWS ACM