Chapter 8: Best Practices for Application Security, Identity, and Compliance
In the past, a common refrain from companies was that they were hesitant to move to the cloud because they believed the cloud was not secure. A big part of this pushback was that companies didn't understand what the cloud was or what its capabilities were. It is true that it is possible to have security vulnerabilities even if you are using cloud infrastructure. However, as we will see in this chapter, AWS provides a comprehensive catalog of services that will enable you to create extremely secure sites and applications.
It is imperative when creating applications and implementing workflows to consider security from the start of your design and not as an afterthought. First, we will explain why security is important in any system – not just in the cloud. Next, we will learn how AWS in general and AWS Identity and Access Management (IAM) in particular can help us to design and build robust and...