Workshop Themes | ||
---|---|---|
Here you'll find a collection of security workshops and other hands-on content that will guide you through prepared scenarios that represent common use cases and security operational tasks on Amazon Web Services (AWS). The workshops align loosely to the Security Perspective of the AWS Cloud Adoption Framework and provide a deep dive into a variety of AWS security services, techniques, and best practices that'll you'll be able to apply to your own environments to better improve your security posture.
Visit the workshop portal to get started: https://awssecworkshops.com
All workshops previously listed here have been migrated to the portal and are listed in the directory.
Coming soon!
If you have ideas for topics or scenarios you would like to see included in new workshops please let us know by submitting it as an issue or contacting us directly at aws-security-workshops@amazon.com
This sample code is made available under a modified MIT license. See the LICENSE file.
aws-security-viz -- A tool to visualize aws security groups DESCRIPTION Need a quick way to visualize your current aws/amazon ec2 security group configuration? aws-security-viz does just that based on
AWS EC2-VPC Security Group Terraform module Terraform module which creates EC2 security group within VPC on AWS. Features This module aims to implement ALL combinations of arguments supported by AWS a
我正在处理一个在现有环境中工作得很好的现有代码。该应用程序有一个登录表单,将用户带到登陆页面后,他们登录。 应用程序在单节点环境中运行良好,例如用户登录时的日志跟踪: 1:[http-bio-8080-exec-1 DEBUG defaultreDirectStrategy-sendredirect-重定向到'/myapp/secure/landing.html' 2:[http-bio-8080
security security_overview In release 0.9.0.0, the Kafka community added a number of features that, used either separately or together, increases security in a Kafka cluster. These features are consid
The security model of WebAssembly has two important goals: (1) protect users from buggy or malicious modules, and (2) provide developers with useful primitives and mitigations for developing safe appl
HTTP用于通过Internet进行通信,因此应用程序开发人员,信息提供者和用户应该了解HTTP/1.1中的安全限制。 此讨论不包括此处提到的问题的最终解决方案,但它确实提出了一些降低安全风险的建议。 个人信息泄漏 HTTP客户端通常知道大量的个人信息,例如用户的姓名,位置,邮件地址,密码,加密密钥等。因此,您应该非常小心地防止通过HTTP协议将此信息无意泄漏到其他来源。 所有机密信息都应以加密形