Summary
In this chapter, we laid the groundwork to enable you to understand how security is implemented in AWS. As we saw in the chapter, a fundamental pillar of this is the shared responsibility model. We saw how some components of security are the responsibility of AWS and some parts are the responsibility of the customer. We then looked at the most basic and fundamental security service in AWS – AWS IAM. We reviewed concepts such as users, groups, permissions, roles, and policies and how they are connected to each other. Finally, in the last section of the chapter, we learned about other security services and how they can make your cloud environment even more secure.
Hopefully, after completing this chapter, you feel more confident about how AWS can be leveraged to write world-class applications offering the highest levels of security.
This concludes Section 2. In Section 3, starting with Chapter 9, Serverless and Container Patterns, we will learn about microservices...