Shared Responsibility Model The AWS Shared Responsibility Model defines the distribution of responsibilities for security in the cloud between Amazon Web Services (AWS) and the customer. It’s important to note the distribution is not static, but varies according to the services deployed on AWS and their level of abstraction.
Amazon Culture of Innovation Monoliths and Microservices: How Amazon tailored its IT to support its customers, and in doing so invented the cloud. If your organisation is currently struggling with how to change and foster innovation, this session will share lessons from Amazon’s history on how to operate in an innovative way.
Introduction to the AWS Well-Architected Framework AWS Well-Architected Framework provides a consistent set of best practices to evaluate architectures, and provides a set of questions you can use to evaluate how well an architecture is aligned to AWS best practices. It is based on five pillars — operational excellence, security, reliability, performance efficiency, and cost optimization.
AWS Shared Responsibility Model This course is an introduction to the AWS Shared Responsibility Model. AWS and the customer share responsibility for security and compliance, and this course helps clarify the division of those responsibilities. From the physical components of your stack all the way up to user data, we define what you are responsible for in terms of securing your application, and what AWS is responsible for.
Getting started - Onboarding Check A guide on how to get started with AWS, from creating an account and setting up access rights to cost optimization and budgets.
AWS Well-Architected Framework information and resources Official AWS Well-Architected Framework page provides all the resources for you to use and implement AWS best practices.
Security Pillar AWS Well-Architected Framework The Security pillar of AWS Cloud Adoption Framework (CAF) includes the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.
10-Minute-Tutorials Get started with a simple “Hello World!” Tutorial that introduces you to an AWS product
AWS Architecture Icons: The official AWS icon set for building architecture diagrams Architecture diagrams are a great way to communicate your design, deployment, and topology. On this page you will find an official collection of AWS Architecture Icons (formerly Simple Icons) that contain AWS product icons, resources, and other tools to help you build diagrams.
ITIL Event Management in the Cloud Many enterprises have successfully migrated some of their on-premises IT workloads to the cloud. An enterprise must also deploy an IT Service Management (ITSM) framework so it can efficiently and effectively operate those IT capabilities. This whitepaper outlines best practices for event management in a hybrid cloud environment using AWS.
AWS Security Fundamentals (Second Edition) In this self-paced course, you will learn fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. We will address and your security responsibility in the AWS cloud and the different security-oriented services available.
AWS Philosophy of Security video from AWS re:Invent This session answers the question “How does AWS operationalize its own security?” This session details both strategic and tactical considerations, along with an insider’s look at AWS tooling and processes.
Cloud Adoption Framework: Security Perspective This whitepaper covers the Security Perspective of AWS Cloud Adoption Framework (CAF), which focuses on incorporating guidance and process for your existing security controls specific to AWS usage in your environment.
AWS Security Essentials This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.
Sichere Reise - angemessene und pragmatische Security The AWS Well-Architected Framework recommends a number of best practices for security in a cloud environment. But especially in the beginning of a cloud journey the number and details of these practices can be overwhelming. This webinar classifies the individual steps within cloud projects and evaluates the security requirements to derive appropriate and pragmatic activities. (by Kilian Ruess)
AWS Security Best Practices This whitepaper provides security best practices that will help you define your Information Security Management System (ISMS) and build a set of security policies and processes for your organization so you can protect your data and assets in the AWS Cloud. The whitepaper also provides an overview of different security topics such as identifying, categorizing and protecting your assets on AWS, managing access to AWS resources using accounts, users and groups and suggesting ways you can secure your data, your operating systems and applications and overall infrastructure in the cloud.
Introduction to AWS Security by Design This whitepaper discusses the concepts of Security by Design, provides a four-phase approach for security and compliance at scale across multiple industries, points to the resources available to AWS customers to implement security into the AWS environment, and describes how to validate controls are operating.
How Should We All Think About Security Security must be at the forefront for any online business. At AWS, security is priority number one. Stephen Schmidt, Vice President and Chief Information Security Officer, shares his insights into cloud security and how AWS meets customers’ demanding security and compliance requirements—and in many cases helps them improve their security posture. Stephen, with his background with the FBI and his work with AWS customers in the government, space exploration, research, and financial services organizations, shares an industry perspective that’s unique and invaluable for today’s IT decision makers.
Overview of Security Processes This document is intended to answer questions, such as How does AWS help me ensure that my data is secure? Specifically, this paper describes AWS physical and operational security processes for the network and server infrastructure under the management of AWS.
AWS Certified Cloud Practitioner certification exam This examination is intended for individuals who have the knowledge and skills necessary to effectively demonstrate an overall understanding of the AWS Cloud, independent of specific technical roles addressed by other AWS Certifications. The exam can be taken at a testing center or from the comfort and convenience of a home or office location as an online proctored exam.
AWS Certified Cloud Practitioner Exam Guide Review the exam guide, which contains the content outline and target audience for the certification exam. Perform a self-assessment to identify your knowledge or skills gaps.
AWS Certified Cloud Practitioner sample questions Review the sample questions, which demonstrate the format of the questions used on the exam.
AWS Certified Cloud Practitioner 2020 This training is designed for the Certified Cloud Practitioner preparation for non-technical personnel in sales, support, and managerial roles who need to understand AWS at a high level, but don’t need to know each service on a technical level. (by CloudGuru, 7 hrs video material)
A Starter’s Guide to Identity and Access Management (IAM) In AWS, the Identity and Access Management (IAM) service provides the necessary capabilities to allow both interactive users and services to interact with other parts of the platform. This course is a practical introduction to the Identity and Access Management service for developers and operators. No prior coding experience is required – all sample code is provided. The various components of the service are covered, as well as hands-on use cases. (by CloudGuru, 1 hr video material)