Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Cloud Design Patterns for AWS

You're reading from   Implementing Cloud Design Patterns for AWS Solutions and design ideas for solving system design problems

Arrow left icon
Product type Paperback
Published in Apr 2019
Publisher Packt
ISBN-13 9781789136203
Length 274 pages
Edition 2nd Edition
Tools
Arrow right icon
Authors (4):
Arrow left icon
Clive Harber Clive Harber
Author Profile Icon Clive Harber
Clive Harber
Sean Keery Sean Keery
Author Profile Icon Sean Keery
Sean Keery
Rick Farmer Rick Farmer
Author Profile Icon Rick Farmer
Rick Farmer
Marcus Young Marcus Young
Author Profile Icon Marcus Young
Marcus Young
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Section 1: The Basics FREE CHAPTER
2. Introduction to Amazon Web Services 3. Core Services - Building Blocks for Your Product 4. Availability Patterns - Understanding Your Needs 5. Security - Ensuring the Integrity of Your Systems 6. Section 2: DevOps Patterns
7. Continuous Deployment - Introducing New Features with Minimal Risk 8. Ephemeral Environments - Sandboxes for Experiments 9. Operation and Maintenance - Keeping Things Running at Peak Performance 10. Application Virtualization - Using Cloud Native Patterns for Your Workloads 11. Antipatterns - Avoiding Counterproductive Solutions 12. Section 3: Persistence Patterns
13. Databases - Identifying Which Type Fits Your Needs 14. Data Processing - Handling Your Data Transformation 15. Observability - Understanding How Your Products Are Behaving 16. Anti-Patterns - Bypassing Inferior Options 17. Other Books You May Enjoy

Security - Ensuring the Integrity of Your Systems

In this chapter, we will address a concern that touches on all aspects of your product. Security best practices will be covered. The three tenets of security are confidentiality, integrity, and availability. Methods we will touch upon that will help you in lowering operational risk, increasing transport layer security, simplifying user and role management, and implementing least privileges while establishing an audit trail for your product. Confidentiality addresses how we protect our data, in motion and at rest, from unauthorized access. This will allow us to establish a perimeter around all of our products from the start. Integrity focuses on the accuracy of our data. We will address different data types in the Persistence Patterns section, and so we will generalize in this chapter. 

In this chapter, we will...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image