Summary
Well done! We are at the end of the chapter, and let's summarize what we covered. We understood the shared responsibility model between AWS and customer to make the environment more secure.
We discussed, in detail, Identity and Access Management and implemented all best practices available in IAM Dashboard that were not compliant earlier. We configured multifactor authentication for AWS root account using the Google Authentication application to make root account access more robust.
After this, we discussed Security Groups and Network Access Control List, and also mentioned differences between both of them wherever it was applicable.
In the next chapter, we will look at the day-to-day issues we encounter while creating and managing AWS resources.