In this chapter, we learnt about securing applications that are built on top of AWS resources. We went through WAF in detail to protect web applications in AWS and learnt about the benefits and lifecycle of Web Application Firewall. We also walked through the process of automating security with WAF.
Furthermore, we went through the process of signing AWS API requests for securing data in transit along with securing information stored in API itself.
Lastly, we learned about two AWS services that are used by developers to secure their web and mobile applications--Amazon Cognito for user management and Amazon API Gateway for managing and securing APIs.
In next chapter, Monitoring in AWS, we will learn about monitoring all AWS resources. Monitoring enables us to gauge operational health, performance, security, and the status of all resources. AWS provides comprehensive monitoring...