Further reading
For further insights into what you’ve learned about in this chapter, refer to the following links:
- https://docs.aws.amazon.com/security/
- https://aws.amazon.com/iam/
- https://aws.amazon.com/guardduty/
- https://aws.amazon.com/inspector/
- https://aws.amazon.com/config/
- https://aws.amazon.com/premiumsupport/technology/trusted-advisor/
- https://docs.aws.amazon.com/whitepapers/latest/introduction-aws-security/data-encryption.html
- https://docs.aws.amazon.com/whitepapers/latest/introduction-aws-security/security-of-the-aws-infrastructure.html
- https://docs.aws.amazon.com/whitepapers/latest/introduction-aws-security/monitoring-and-logging.html
- https://aws.amazon.com/security/continuous-monitoring-threat-detection/