Best Practices for Managing Security Operations in AWS
Wednesday, March 29, 2017 9:00:00 AM PDT - 10:30:00 AM PDT
To help prevent unexpected access to your AWS resources, it is critical to maintain strong identity and access policies. It is equally important to track and alert on changes to your AWS resources. In this tech talk, you will learn how to use AWS Identity and Access Management (IAM) to control access to your AWS resources and integrate your existing authentication system with AWS IAM. We will cover how you can deploy and control your AWS infrastructure using code templates, including change management policies with AWS CloudFormation. In addition, we will explore different options for managing both your AWS access logs and your Amazon Elastic Compute Cloud (EC2) system logs using Amazon CloudWatch Logs. We also will cover how to use these logs to implement an audit and compliance validation process using services such as AWS Config, AWS CloudTrail, and Amazon Inspector. 

Learning Objectives:
• Understand the AWS Shared Responsibility Model. 
• Understand AWS account and identity management options and configuration. 
• Learn the concept of infrastructure as code and change management using AWS CloudFormation. 
• Learn how to audit and log your AWS service usage. 
• Learn about AWS services to add automatic compliance checks to your AWS infrastructure. 

Who Should Attend: 
IT Administrators, Architects, and Security Engineers, or anyone interested in controlling access to AWS resources, deploying infrastructure on AWS, or performing compliance checks on their infrastructure
The event has ended. Thank you