Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS Administration ??? The  Definitive Guide

You're reading from   AWS Administration ??? The Definitive Guide Learn to design, build, and manage your infrastructure on the most popular of all the Cloud platforms - Amazon Web Services

Arrow left icon
Product type Paperback
Published in Feb 2016
Publisher Packt
ISBN-13 9781782173755
Length 326 pages
Edition 1st Edition
Tools
Arrow right icon
Toc

Table of Contents (12) Chapters Close

Preface 1. Introducing Amazon Web Services FREE CHAPTER 2. Security and Access Management 3. Images and Instances 4. Security, Storage, Networking, and Lots More! 5. Building Your Own Private Clouds Using Amazon VPC 6. Monitoring Your AWS Infrastructure 7. Manage Your Applications with Auto Scaling and Elastic Load Balancing 8. Database-as-a-Service Using Amazon RDS 9. Working with Simple Storage Service 10. Extended AWS Services for Your Applications Index

Recommendations and best practices

Here are a few key takeaways from this chapter:

  • Get rid of the Root Account, use IAM wherever necessary. Hide away the Root key and avoid using it unless it's the end of the world!
  • Create a separate IAM users for your organization, each with their own sets of access and Secret Keys. DO NOT SHARE YOUR KEYS OR PASSWORDS! Sharing such things is never a good idea and can cause serious implications and problems.
  • Create separate administrators for each of the AWS services that you use.
  • Use roles and groups to assign individual IAM users permissions. Always employ the least privilege approach wherein a particular group or role has the least amount of privileges assigned to it. Provide only the required level of access and permissions that the task demands.
  • Leverage multi-factor authentication (MFA) wherever possible. Although passwords are good, they are still not the best option when it comes to authenticating users at times.
  • Rotate your passwords and keys on...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime