From the course: Complete Guide to the AWS Well-Architected Framework
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Managing incident response - Amazon Web Services (AWS) Tutorial
From the course: Complete Guide to the AWS Well-Architected Framework
Managing incident response
- [Instructor] When it comes to managing a response to a security breach or incident, we also have to take a look at how Amazon architects their services to actually handle when they get under attack. Because of course when they get under attack, we get under attack. First up, a managed service, regardless of the managed service, is a massive server farm. That massive server farm is spread typically across a number of buildings within the region. The service is monitored. If it's under attack, it scales out. So it can scale on demand to get bigger. Particularly public facing services like the API gateway or load balancers or S3 storage. If anything gets under attack at AWS, it has to respond. So it has to scale bigger, and that's just what it does. So using an elastic load balancer to front your application can help mitigate attacks 'cause it's built to be under load, under unexpected load, and hopefully your application sitting behind it is built to scale up and down as well. If I'm…
Contents
-
-
-
-
-
-
(Locked)
Security pillar overview2m 21s
-
(Locked)
Design principles7m 14s
-
(Locked)
Identity and Access Management2m 59s
-
(Locked)
Demo: IAM security overview4m 51s
-
(Locked)
Protecting AWS credentials3m 54s
-
(Locked)
Identify threats: Detective controls3m 25s
-
(Locked)
AWS detective controls for security4m 29s
-
(Locked)
Implement an auditing workflow3m 37s
-
(Locked)
Challenge: Review a CloudTrail event56s
-
(Locked)
Solution: Review a CloudTrail event1m 23s
-
(Locked)
Auditing and notifications4m 46s
-
(Locked)
Infrastructure protection4m 57s
-
(Locked)
Key AWS services for infrastructure protection5m 55s
-
(Locked)
Data protection methods2m 18s
-
(Locked)
Key AWS services for data protection3m 15s
-
(Locked)
Protecting your data at rest at AWS1m 50s
-
(Locked)
Protecting data in transit at AWS2m 43s
-
(Locked)
Responding to security incidents2m 33s
-
(Locked)
Managing incident response4m 27s
-
(Locked)
Demo: Using the Well-Architected Tool2m 12s
-
(Locked)
-
-
-
-
-