Evaluating the Environment for Security Vulnerabilities
Before you can make any adjustments to your solution or its AWS environment, you need to assess them against a set of security best practices. AWS provides a comprehensive list of security best practices, which can be found in the Security pillar of the AWS Well-Architected Framework. We’ve used this framework extensively across this book, and we will rely on its wisdom in this chapter since it represents the central reference for AWS best practices. Now, apart from this framework’s security pillar, there is another essential resource at your disposal, which is the AWS Security Reference Architecture (SRA). The SRA consists of a set of guidelines that helps you implement AWS security best practices leveraging the rich portfolio of AWS services. In its current form, it actually takes you through a concrete example showing how to set up your AWS environment in order to securely run a three-tier web application. It...