{"id":925,"date":"2019-07-02T10:43:18","date_gmt":"2019-07-02T10:43:18","guid":{"rendered":"https:\/\/www.testpreptraining.com\/tutorial\/?page_id=925"},"modified":"2020-05-02T07:16:15","modified_gmt":"2020-05-02T07:16:15","slug":"aws-cloud-security","status":"publish","type":"page","link":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/","title":{"rendered":"Define AWS Cloud Security and Compliance Concepts"},"content":{"rendered":"\n<p>Cloud security at AWS is the highest priority. AWS cloud\nallows customers to scale and innovate, while maintaining a secure environment.\n<\/p>\n\n\n\n<p>AWS Cloud Security and Compliance covers following aspects\nof AWS Security<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Infrastructure Security<\/li><li>Infrastructure Resilience<\/li><li>Data Encryption<\/li><li>Monitoring and Logging<\/li><li>Identity and Access Control<\/li><li>Compliance Assurance Programs<\/li><li>Security Support<\/li><li>  Standards and Best Practices <\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Infrastructure Security<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Network firewalls built into Amazon VPC.<\/li><li>TLS encryption in transit across all services.<\/li><li>Private or dedicated connections into your data\ncentre <\/li><\/ul>\n\n\n\n<p><strong>Amazon VPC<\/strong><\/p>\n\n\n\n<p>Amazon Virtual Private Cloud (Amazon VPC) <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>enables you to launch AWS resources into a\nvirtual network that you&#8217;ve defined. <\/li><li>It resembles a traditional network in data\ncenters<\/li><li>Benefits of using the scalable infrastructure of\nAWS.<\/li><li>Logically isolated from other virtual networks\nin the AWS Cloud. <\/li><li>Launch AWS resources, like EC2 instances, into\nVPC. <\/li><li>Use a public subnet for resources that must be\nconnected to the internet<\/li><li>Use a&nbsp;\nprivate subnet for resources that won&#8217;t be connected to the internet.<\/li><li>You can specify <ul><li>an IP address range<\/li><\/ul><ul><li>add subnets<\/li><\/ul><ul><li>&nbsp;associate\nsecurity groups<\/li><\/ul><ul><li>configure route tables.<\/li><\/ul><\/li><\/ul>\n\n\n\n<p><strong>Accessing the Internet<\/strong> <strong>by VPC<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Default VPC includes an internet gateway, and\neach default subnet is a public subnet. <\/li><li>Each instance that you launch into a default\nsubnet has a private IPv4 address and a public IPv4 address. <\/li><li>These instances can communicate with the\ninternet through the internet gateway. <\/li><li>An internet gateway connect to the internet\nthrough the Amazon EC2 network edge.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"476\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-476x400.png\" alt=\"define aws cloud security and compliance concepts\" class=\"wp-image-991\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-476x400.png 476w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts.png 574w\" sizes=\"auto, (max-width: 476px) 100vw, 476px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>By default, each instance launched into a\nnondefault subnet has a private IPv4 address, but no public IPv4 address,\nunless assigned or modify the subnet&#8217;s public IP address attribute. <\/li><li>These instances can communicate with each other,\nbut can&#8217;t access the internet.<\/li><li>Can enable internet access for an a nondefault\nsubnet by attaching an internet gateway to its VPC and associating an Elastic\nIP address with the instance.<\/li><li>Amazon VPC provides a web-based user interface,\nthe Amazon VPC console. <\/li><li>Access the Amazon VPC console by signing into\nthe AWS Management Console and choosing VPC.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Infrastructure Resilience<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Technologies built from the ground up for\nresilience in the face of DDoS attacks.<\/li><li>Services can be used in combination to\nautomatically scale for traffic load.<\/li><li>Autoscaling, CloudFront, Route 53 can be used to\nprevent DDoS. <\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">AWS Shield <\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>It is a managed DDoS protection service <\/li><li>Available in two tiers: Standard and Advanced. <\/li><li>AWS Shield Standard applies always-on detection\nand inline mitigation techniques like deterministic packet filtering and\npriority-based traffic shaping. It is included automatically and transparently\nto Elastic Load Balancing load balancers, Amazon CloudFront distributions, and\nAmazon Route 53 resources at no additional cost. <\/li><li>AWS Shield Advanced includes access to near\nreal-time metrics and reports, for extensive visibility into infrastructure\nlayer and application layer DDoS attacks. <\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">AWS WAF<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>It is a web application firewall to protect web\napplications from common web exploits. <\/li><li>It defines customizable web security rules to\ncontrol which traffic accesses web applications. <\/li><li>Rules use conditions to target specific requests\nand trigger an action, <\/li><li>It helps you to identify and block common DDoS\nrequest patterns and effectively mitigate a DDoS attack. <\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"> Amazon Route 53<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>It is a highly available and scalable DNS\nservice <\/li><li>Designed to route end users to infrastructure\nrunning inside or outside of AWS.<\/li><li>It can manage traffic globally through a variety\nof routing types, and provides out-of-the-box shuffle sharding and Anycast\nrouting capabilities to protect domain names from DNS-based DDoS attacks.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Amazon CloudFront<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Distributes traffic across multiple edge\nlocations <\/li><li>Filters requests to ensure that only valid\nHTTP(S) requests will be forwarded to backend hosts. <\/li><li>Supports geoblocking, to prevent requests from\nparticular geographic locations.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Elastic Load Balancing <\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Distributes incoming application traffic across\nmultiple targets like , such as Amazon Elastic Compute Cloud (Amazon EC2)\ninstances, containers, and IP addresses, and multiple Availability Zones, to minimizes\noverloading a single resource. <\/li><li>Elastic Load Balancing, like CloudFront, only\nsupports valid TCP requests, so DDoS attacks such as UDP and SYN floods are not\nable to reach EC2 instances. <\/li><li>It is a single point of management <\/li><li>It can serve as a line of defense between the\ninternet and private EC2 instances. <\/li><li>It includes the Application Load Balancer, for\nload balancing of HTTP and HTTPS traffic and also directly supports AWS WAF.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">VPCs and Security Groups <\/h2>\n\n\n\n<p>Security groups or origin access identity (OAI), require\nattackers to make requests through AWS WAF and CloudFront instead from the\nwebsite origin and minimizes the attack surface of <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>backend load balancers<\/li><li>EC2 instances<\/li><li>Amazon Simple Storage Service (Amazon S3)\nbuckets <\/li><\/ul>\n\n\n\n<p>Amazon Virtual Private Cloud (Amazon VPC) allows to configure\n<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>subnet routes<\/li><li>public IP addresses<\/li><li>security groups<\/li><li>network access control lists <\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"271\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-01-750x271.png\" alt=\"define aws cloud security and compliance concepts\n\" class=\"wp-image-992\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-01-750x271.png 750w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-01.png 859w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nAbove,\nuses Route 53, AWS WAF, CloudFront, and Elastic Load Balancing to control and\ndistribute traffic. \n\n\n\n<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data Encryption<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Encryption at rest available in EBS, S3,\nGlacier, RDS (Oracle and SQL Server) and Redshift.<\/li><li>Key management through AWS KMS &#8211; you can choose\nwhether to control the keys or let AWS.<\/li><li>Server side encryption of message queues in SQS.<\/li><li>Dedicated hardware-based cryptographic key\nstorage using AWS CloudHSM, allowing you to satisfy compliance requirements.<\/li><li>APIs to integrate AWS security into any\napplications you create. <\/li><\/ul>\n\n\n\n<p><strong>Server-Side Encryption<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>It is data encryption at rest<\/li><li>Like, Amazon S3 encrypts your data at the object level as it writes it to disks in its data centers and decrypts it for you when you access it. <\/li><li>You need to authenticate your request and you have access permissions <\/li><\/ul>\n\n\n\n<p>3 mutually exclusive options depending on how you choose to\nmanage the encryption keys:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use Server-Side Encryption with Amazon\nS3-Managed Keys (SSE-S3) \u2013 Each object is encrypted with a unique key. As an\nadditional safeguard, it encrypts the key itself with a master key that it\nregularly rotates. Amazon S3 server-side encryption uses one of the strongest\nblock ciphers available, 256-bit Advanced Encryption Standard (AES-256), to\nencrypt your data. <\/li><li>Use Server-Side Encryption with AWS KMS-Managed\nKeys (SSE-KMS) \u2013 Similar to SSE-S3, but with some additional benefits along\nwith some additional charges for using this service. There are separate\npermissions for the use of an envelope key (that is, a key that protects your\ndata&#8217;s encryption key) that provides added protection against unauthorized\naccess of your objects in Amazon S3. SSE-KMS also provides you with an audit\ntrail of when your key was used and by whom. Additionally, you have the option\nto create and manage encryption keys yourself, or use a default key that is\nunique to you, the service you&#8217;re using, and the Region you&#8217;re working in. <\/li><li>Use Server-Side Encryption with\nCustomer-Provided Keys (SSE-C) \u2013 You manage the encryption keys and Amazon S3\nmanages the encryption, as it writes to disks, and decryption, when you access\nyour objects. <\/li><\/ul>\n\n\n\n<p>Client-side encryption is the act of encrypting data before\nsending it to Amazon S3. To enable client-side encryption, you have the\nfollowing options:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use an AWS KMS-managed customer master key.<\/li><li>Use a client-side master key.<\/li><\/ul>\n\n\n\n<p>The following AWS SDKs support client-side encryption:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>AWS SDK for .NET<\/li><li>AWS SDK for Go<\/li><li>AWS SDK for Java<\/li><li>AWS SDK for PHP<\/li><li>AWS SDK for Ruby<\/li><li>AWS SDK for C++<\/li><\/ul>\n\n\n\n<p><strong>Sample Implementation<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"399\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-02-399x400.png\" alt=\"\" class=\"wp-image-993\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-02-399x400.png 399w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-02-300x300.png 300w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-02.png 468w\" sizes=\"auto, (max-width: 399px) 100vw, 399px\" \/><\/figure><\/div>\n\n\n\n<p>In above diagram:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>The administrator encrypts a secret password by\nusing KMS. The encrypted password is stored in a file.<\/li><li>The administrator puts the file containing the\nencrypted password in an S3 bucket.<\/li><li>At instance boot time, the instance copies the\nencrypted file to an internal disk.<\/li><li>The EC2 instance then decrypts the file using\nKMS and retrieves the plaintext password. The password is used to configure the\nLinux encrypted file system with LUKS. All data written to the encrypted file\nsystem is encrypted by using an AES-256 encryption algorithm when stored on\ndisk.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Standards and Best Practices<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>A security assessment service, Amazon Inspector,\nthat automatically assesses applications for vulnerabilities or deviations from\nbest practices, including impacted networks, OS, and attached storage <\/li><li>Deployment tools to manage the creation and\ndecommissioning of AWS resources according to organization standards<\/li><li>Inventory and configuration management tools,\nincluding AWS Config, that identify AWS resources and then track and manage\nchanges to those resources over time<\/li><li>Template definition and management tools,\nincluding AWS CloudFormation to create standard, preconfigured environments <\/li><\/ul>\n\n\n\n<p><strong>Amazon Inspector<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>It is an automated security assessment service <\/li><li>Improve the security and compliance of applications\ndeployed on AWS. <\/li><li>Automatically assesses applications for\nexposure, vulnerabilities, and deviations from best practices. After\nassessment, it produces a detailed list of security findings prioritized by\nlevel of severity. <\/li><\/ul>\n\n\n\n<p><strong>AWS Config <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>It provides a detailed view of the resources\nassociated with your AWS account, <\/li><li>It includes <ul><li>how resources are configured<\/li><\/ul><ul><li>how they are related to one another<\/li><\/ul><ul><li>&nbsp;how the\nconfigurations and their relationships have changed over time<\/li><\/ul><\/li><li>It continuously monitors and records your AWS\nresource configurations <\/li><li>You can automate the evaluation of recorded\nconfigurations against desired configurations. <\/li><\/ul>\n\n\n\n<p> <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"353\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-03-750x353.png\" alt=\"\" class=\"wp-image-994\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-03-750x353.png 750w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-03.png 851w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Monitoring and Logging<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Deep visibility into API calls through AWS\nCloudTrail, including who, what, who, and from where calls were made<\/li><li>Log aggregation options, streamlining\ninvestigations and compliance reporting<\/li><li>Alert notifications through Amazon CloudWatch\nwhen specific events occur or thresholds are exceeded <\/li><\/ul>\n\n\n\n<p><strong>AWS CloudTrail<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>It helps you enable governance, compliance, and\noperational and risk auditing. <\/li><li>Actions taken by a user, role, or an AWS service\nare recorded as events in CloudTrail. <\/li><li>Events include actions taken in the AWS\nManagement Console, AWS Command Line Interface, and AWS SDKs and APIs.<\/li><li>CloudTrail is enabled on your AWS account when\nyou create it. <\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"191\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-04-750x191.png\" alt=\"\" class=\"wp-image-995\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-04-750x191.png 750w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-04.png 1181w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Identity and Access Control<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>AWS Identity and Access Management (IAM) lets\nyou define individual user accounts with permissions across AWS resources<\/li><li>AWS Multi-Factor Authentication for privileged\naccounts, including options for hardware-based authenticators<\/li><li>AWS Directory Service allows you to integrate\nand federate with corporate directories to reduce administrative overhead and\nimprove end-user experience <\/li><\/ul>\n\n\n\n<p><strong>AWS Multi-Factor Authentication<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>With MFA, when a user signs in to an AWS\nwebsite, they will be prompted for <ul><li>their user name and password (the first\nfactor\u2014what they know)<\/li><\/ul><ul><li>an authentication response from their AWS MFA\ndevice (the second factor\u2014what they have)<\/li><\/ul><\/li><li>Multiple factors provide increased security for\nAWS account settings and resources. <\/li><li>Enable MFA for AWS account and for individual\nIAM users created under account. <\/li><li>MFA can be also be used to control access to AWS\nservice APIs.<\/li><\/ul>\n\n\n\n<p>Supported MFA mechanism other than, regular sign-in\ncredentials, are<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Virtual MFA devices. A software app that runs on\na phone or other mobile device and emulates a physical device. The device\ngenerates a six-digit numeric code based upon a time-synchronized one-time\npassword algorithm. The user must type a valid code from the device on a second\nwebpage during sign-in. Each virtual MFA device assigned to a user must be\nunique. A user cannot type a code from another user&#8217;s virtual MFA device to\nauthenticate. <\/li><li>U2F security key. A device that you plug into a\nUSB port on your computer. U2F is an open authentication standard hosted by the\nFIDO Alliance. When you enable a U2F security key, you sign in by entering your\ncredentials and then tapping the device instead of manually entering a code. <\/li><li>Hardware MFA device. A hardware device that\ngenerates a six-digit numeric code based upon a time-synchronized one-time\npassword algorithm. The user must type a valid code from the device on a second\nwebpage during sign-in. Each MFA device assigned to a user must be unique. A\nuser cannot type a code from another user&#8217;s device to be authenticated. <\/li><li>SMS text message-based MFA. A type of MFA in\nwhich the IAM user settings include the phone number of the user&#8217;s\nSMS-compatible mobile device. When the user signs in, AWS sends a six-digit\nnumeric code by SMS text message to the user&#8217;s mobile device. The user is\nrequired to type that code on a second webpage during sign-in. Note that\nSMS-based MFA is available only for IAM users. You cannot use this type of MFA\nwith the AWS account root user.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Security Support<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Real-time insight through AWS Trusted Advisor<\/li><li>Proactive support and advocacy with a Technical\nAccount Manager (TAM) <\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Compliance Assurance Programs<\/h2>\n\n\n\n<p>From certifications, regulations to frameworks, AWS has you\ncovered. Some of those included are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cyber Essentials Plus (UK)<\/li><li>DoD SRG (US)<\/li><li>FIPS (US)<\/li><li>ISO 9001<\/li><li>CISPE<\/li><li>GLBA<\/li><li>UK Data Protection Act<\/li><li>EU Data Protection Directive<\/li><li>FFIEC<\/li><li>G-Cloud (UK)<\/li><li>NIST<\/li><li>UK Cloud Security Principles <\/li><\/ul>\n\n\n\n<p>Link for free practice test &#8211; <a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-cloud-practitioner-free-practice-test\">https:\/\/www.testpreptraining.ai\/aws-certified-cloud-practitioner-free-practice-test<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud security at AWS is the highest priority. AWS cloud allows customers to scale and innovate, while maintaining a secure environment. AWS Cloud Security and Compliance covers following aspects of AWS Security Infrastructure Security Infrastructure Resilience Data Encryption Monitoring and Logging Identity and Access Control Compliance Assurance Programs Security Support Standards and Best Practices Infrastructure&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":906,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-925","page","type-page","status-publish","hentry","category-amazon-aws"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Define AWS Cloud Security and Compliance Concepts - Testprep Training Tutorials<\/title>\n<meta name=\"description\" content=\"define aws cloud security and compliance concepts tutorial, brief notes, dumps, summary and pdf. It is required to pass the aws cloud practitioner exam\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Define AWS Cloud Security and Compliance Concepts - Testprep Training Tutorials\" \/>\n<meta property=\"og:description\" content=\"define aws cloud security and compliance concepts tutorial, brief notes, dumps, summary and pdf. It is required to pass the aws cloud practitioner exam\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Testprep Training Tutorials\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-02T07:16:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-476x400.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/\",\"name\":\"Define AWS Cloud Security and Compliance Concepts - Testprep Training Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\"},\"datePublished\":\"2019-07-02T10:43:18+00:00\",\"dateModified\":\"2020-05-02T07:16:15+00:00\",\"description\":\"define aws cloud security and compliance concepts tutorial, brief notes, dumps, summary and pdf. It is required to pass the aws cloud practitioner exam\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS Cloud Practitioner (CLF-C02)\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Define AWS Cloud Security and Compliance Concepts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"name\":\"Testprep Training Tutorials\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\",\"name\":\"Testprep Training\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"contentUrl\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"width\":583,\"height\":153,\"caption\":\"Testprep Training\"},\"image\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Define AWS Cloud Security and Compliance Concepts - Testprep Training Tutorials","description":"define aws cloud security and compliance concepts tutorial, brief notes, dumps, summary and pdf. It is required to pass the aws cloud practitioner exam","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Define AWS Cloud Security and Compliance Concepts - Testprep Training Tutorials","og_description":"define aws cloud security and compliance concepts tutorial, brief notes, dumps, summary and pdf. It is required to pass the aws cloud practitioner exam","og_url":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/","og_site_name":"Testprep Training Tutorials","article_modified_time":"2020-05-02T07:16:15+00:00","og_image":[{"url":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/07\/define-aws-cloud-security-and-compliance-concepts-476x400.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/","url":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/","name":"Define AWS Cloud Security and Compliance Concepts - Testprep Training Tutorials","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website"},"datePublished":"2019-07-02T10:43:18+00:00","dateModified":"2020-05-02T07:16:15+00:00","description":"define aws cloud security and compliance concepts tutorial, brief notes, dumps, summary and pdf. It is required to pass the aws cloud practitioner exam","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/aws-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/tutorial\/"},{"@type":"ListItem","position":2,"name":"AWS Cloud Practitioner (CLF-C02)","item":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-cloud-practitioner\/"},{"@type":"ListItem","position":3,"name":"Define AWS Cloud Security and Compliance Concepts"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","name":"Testprep Training Tutorials","description":"","publisher":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization","name":"Testprep Training","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/","url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","contentUrl":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","width":583,"height":153,"caption":"Testprep Training"},"image":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/comments?post=925"}],"version-history":[{"count":8,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/925\/revisions"}],"predecessor-version":[{"id":5257,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/925\/revisions\/5257"}],"up":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/906"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media?parent=925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/categories?post=925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/tags?post=925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}