- IAM Overview
- IAM Policy
- Policy Evaluation Logic
- Trust Policy
- Permission Boundary
- ABAC for AWS
- IAM Role
- AWS STS, Revoking Temporary Credentials
- IAM Access Analyzer
- IAM Credential Report
- Identity Providers and Federation
- Web Identity Federation
- AWS Cognito
- Web Identity Federation API
- AWS SSO
- SAML 2.0 Identity Federation
- Custom Identity broker Federation
- AWS Organization
- AWS Cloud Trail
- AWS Config
- AWS Guard Duty
- Amazon Inspector
- AWS Trusted Advisor
- CloudWatch, AWS X-Ray
- VPC Flow Logs
- AWS Security Hub
- Amazon Detective
- CloudWatch Insight
- Amazon Macie
- Amazon Event Bridge
- AWS Artifacts
- Athena
- AWS WAF
- AWS Shield
- DDoS attack
- AWS SES
- AWS CloudFront
- Lambda@Edge
- Elastic Cache, API Gateway
- VPC Private link
- Gateway Endpoint
- VPC Peering
- VPN Connect
- Transitive Gateway
- BGP
- Direct Connect
- IpSec Tunnel
- NACL and SG
- Protect EBS
- Protect EC2 & its metadata services
- Lambda
- Step Functions
- EKS
- Containers
- Amazon System Manager
- Why Bastion host needs to be replaced by Amazon SSM?
- KMS, Key Policies
- KMS Key Rotation
- Own Key Pair KMS
- KMS with EBS
- KMS Grants
- KMS via Service
- Cross Account KMS
- EBS Encryption, snapshot, Transfer Encrypted EBS
- S3 Encryption, S3 Object Lock S3 Policies, ACL
- RDS Encryption, Dynamodb
- AWS SSM Parameter Store
- AWS Secret Manager
- Glacier & Vault lock policies 12.Container Security
- ELB
- AWS Certificate Man.
- ELB with Certificate Manager
- HTTP VS TCP listeners in ELB
- API Gateway Edge Optimized
- HTTPS Listeners for ALB
- Network Packet Inspection
- SES
- AWS Abuse Notice
- Handle Expose Access keys
- Handle compromised EC2 instances
- Four steps to address incidents: 1.Educate 2.Prepare 3.Simulate 4.Iterate
My notes Reference are the following: