Chapter 11
The Security Pillar
THE AWS CERTIFIED SOLUTIONS ARCHITECT ASSOCIATE EXAM OBJECTIVES COVERED IN THIS CHAPTER MAY INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING:
- Domain 3: Specify Secure Applications and Architectures
- ✓ 3.1 Determine how to secure application tiers.
- ✓ 3.2 Determine how to secure data.
- ✓ 3.3 Define the networking infrastructure for a single VPC application.
Introduction
The primary goal of information security is to protect data, which of course entails protecting the resources that store and provide access to that data. To effectively protect data, there are three elements of the data you need to ensure: confidentiality, integrity, and availability.
Confidentiality The only people or systems that can access data are those authorized to access it. Encryption and access control lists (ACLs) are two common mechanisms for enforcing confidentiality.
Integrity The data has not been maliciously or accidentally changed. Cryptographic hashing...