Design Secure Workloads and Applications
So far, you have explored how to secure access to AWS, but you will now look at each of the ways that you can secure applications and workloads. The very first point to consider is how the application itself is accessed. Ensure that not only do your users have to authenticate to use your application but that you also have some authentication mechanism to manage your application, ensuring that you are storing any application secrets in AWS Secrets Manager.
There can be a number of threats that you need to be aware of when designing your applications.
Threat Vectors: Detections and Mitigations
The two common attacks that might feature on the SAA-C03 exam are distributed denial-of-service (DDoS) and SQL injection attacks, which were taught in Chapter 10, Security.
DDoS is a type of attack whereby an application is flooded with so many bogus requests that legitimate requests cannot make it through to the application. There are several...