To follow along with this chapter, you do not need any software or hardware. However, to get the most out of the information presented, you should have an understanding of the following:
- AWS route tables and basic routing principles (covered in Chapter 7, Configuring Infrastructure Security)
- Security groups (covered in Chapter 7, Configuring Infrastructure Security)
- IAM policies and policy syntax (covered in Chapter 4, Working with Access Policies)