AWS Security Guide: 7 Best Practices to Avoid Security Risks

Insufficient Visibility

Best Practice

Exposed Root Accounts

Best Practice

Extra, Unnecessary Privileges

Best Practice

Rotate IAM Access Keys and Credentials

Best Practice

Poor Authentication Practices

Best Practice

Get Rid of Unwanted Privileges

Best Practice

Unpatched Host Servers and Services

Best Practice

  1. Start a screen session in your shell window. Screen sessions help you reconnect to a SSH session even after being disconnected.

Broad IP Ranges for Security Groups and Unrestricted Outbound Traffic

Best Practice

Conclusion

--

--

--

We are a 501(c)(3) non-profit organization dedicated to inspiring women to excel in technology careers. https://www.womenwhocode.com/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} ワーズアンドマジック Hack Free Resources Generator

An Architecture for the Control and Secure Processing of Personal Data

Getting a foothold: An attack plan

🔥 Deswap Airdrop (DAW)

Best sites to sell and buy sneakers and apparel

{UPDATE} A Airy Fairy Game Hack Free Resources Generator

Active Directory: What do CTF environments teach us about attacking Domain Controllers? — Analysis

TryHackMe — OWASP Top 10 — Authentication

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Women Who Code

Women Who Code

We are a 501(c)(3) non-profit organization dedicated to inspiring women to excel in technology careers. https://www.womenwhocode.com/

More from Medium

Kubernetes Certified Application Developer (CKAD)

Build a AWS Custom Authorizer in Python for AppSync

AWS Code Pipeline

Containerization in AWS using Elastic Container Service(ECS)