I share the five security pillars that every AWS cloud deployment should consider and ultimately implement within each layer of your application/system deployment.
The 5 Security Pillars Required For All AWS Cloud Deployments

I share the five security pillars that every AWS cloud deployment should consider and ultimately implement within each layer of your application/system deployment.
In this article today, I provide you with a checklist that you can use to make sure you have processes and programs in place for properly securing your workloads in the cloud.
Before we can build the new Web Phonebook Application, you need to have a free AWS account and you need some background information about how AWS IAM works and how it applies to our Web Phonebook Application.
In a brand new series of articles, I walk you through how to build a web-based phonebook application on AWS to help illustrate the basics of cloud computing.
You should look at each of your AWS workloads and run them through this basic security principles checklist to ensure you are not missing the obvious.
Visual Studio Code is an IDE tool that developers use to write code to build cloud environments (Infrastructure as Code).
Use this 17 item IAM best practices checklist as an internal audit for your AWS cloud computing environment.
AWS CloudShell is a powerful and safe way to use the command line interface (CLI) in your browser.
The “how” of security has dramatically changed with cloud computing, but the underlying strategies still remain very similar. There are many new opportunities to adopt the power and benefits of the cloud within our security strategies and programs.
I recently took the AWS Security Fundamentals Training course and passed the exam. The AWS Security Fundamentals Training course is a great place to start if you are interested in earning your AWS Security Speciality Certification.