Setting up security
This section looks at securing AWS infrastructure and the application. As the AWS security model is a shared one where Amazon is responsible for the security of the infrastructure-like facilities, hardware, network, and some software including virtualization, host operating systems and so on, you as the user are responsible for the security of your software stack, application, updates, data at rest and in transit, data stores, configuration properties, policies, credentials, and the security of the AWS services being used.
Using AWS IAM to secure an infrastructure
AWS Identity and Access Management (IAM) is a web service that enables you to manage users and user permissions within the AWS infrastructure. This allows for the central control of users, user access, and security credentials. As there are a plethora of services being offered by AWS, there is a need for authorized users to securely access these services. IAM defines concepts, constructs, and services to achieve...