Section 1
Amazon Web Services Regions and Availability Zones
Identify Types of Attack used on AWS
External Infrastructure of your AWS cloud
Application(s) you host/create on your platform
Internal Infrastructure of your AWS cloud
API, i.e., Application Programming Interface
Web applications hosted by organization
Analyzing Programming languages
Virtual machines and operating systems
Analyzing the security of the AWS Cloud
Analyzing security in the AWS cloud
Explore various tools for AWS
Inspect an automated framework for assessing AWS Infrastructure
Write your own tools for AWS infrastructure assessment
Tools to be tested for AWS Security includes
Governance
• Recognize AWS usage/implementation
• Define AWS boundaries and identify assets
• Identify, review, and evaluate risks
• Inventory and documentation
• Add AWS to the risk assessment
• IT security and programme administration
Network Management
Network Security Controls
Granting and revoking access
Inventory and documentation
Encryption Control
Logging and Monitoring
Review policies for “adequacy”
Examine the Identity and Access Management (IAM) credential report
Aggregate from multiple sources
Intrusion detection & response