AWS Security Hub Overview
Other AWS Security Services
AWS Security Hub
This course explores AWS Security Hub, starting with a high-level overview of AWS security. We are then going to highlight some of the services that sit in the AWS security space concluding with AWS Security Hub and some sample security result findings obtained using the AWS Console.
- Learn how AWS Security Hub helps you automate security checks, manage security issues, and identify the highest priority security findings in your AWS implementation
- Understand AWS security services including Amazon Inspector, Macie, and Guard Duty
- Learn how to check your environments and systems against security industry standards and best practices
This course is intended for architects, developers, and system operators looking for a unified, scalable way to secure AWS accounts and resources.
To get the most out of this course, you should meet the requirements for the AWS Cloud Practitioner certification and preferably one of the AWS associate-level certifications.
Amazon Macie uses machine learning to do its work and helps you discover and analyze sensitive data stored in Amazon S3 buckets, including personal identifiable information, or PII, such as names, addresses, credit card numbers, API Keys, and access credentials among many others. Macie scans S3 buckets and recognizes critical private information. It also automatically tracks changes to buckets and only evaluates new or modified objects in future scans. That way, it doesn't have to review objects that have not changed and makes the discovery job significantly more efficient and scalable. You can run one-time or automated data discovery and display the results to AWS Security Hub.
Amazon Macie provides a list of findings where the severity and finding type are clearly displayed. In this case, we created a bucket called academy-ca-macie and uploaded a file with disabled user keys, an RDS SQL Query, a credit card list in CSV format, and a few other files. Notice the severity as medium or high. Also, notice the finding type for the S3 objects include Personal, Financial, and Credentials. It also points to the resource that is affected. Finally, it shows when the object was last scanned. In the future, unless there is a change, these objects will not be re-evaluated.
Experienced in architecture and delivery of cloud-based solutions, the development, and delivery of technical training, defining requirements, use cases, and validating architectures for results. Excellent leadership, communication, and presentation skills with attention to details. Hands-on administration/development experience with the ability to mentor and train current & emerging technologies, (Cloud, ML, IoT, Microservices, Big Data & Analytics).