1. Home
  2. Training Library
  3. Security & Compliance (SOA-C02)

Overview of Amazon Cognito

Contents

keyboard_tab
Key Management Service (KMS)
7
What is KMS?
PREVIEW8m 25s
8
Components of KMS
PREVIEW11m 6s
AWS Web Application Firewall
AWS Shield

The course is part of this learning path

Overview of Amazon Cognito
Overview
Difficulty
Beginner
Duration
5h 2m
Students
51
Ratings
3.4/5
starstarstarstar-halfstar-border
Description

This course looks at the key Security services within AWS relevant to the SysOps Administrator - Associate exam. The core to security is Identity & Access Management, commonly referred to as IAM. This service manages identities and their permissions that are able to access your AWS resources and so understanding how this service works and what you can do with it will help you to maintain a secure AWS environment.  In addition to IAM, this course covers a range of other security services covering encryption and access control

Learning Objectives

  • Learn about identity and access management on AWS including users, groups & roles, IAM policies, MFA, and cross-account access
  • Learn the fundamentals of AWS Web Application Firewall (WAF) including what it is, when to use it, how it works, and why use it
  • Learn how to manage data protection through encryption services such as the Key Management Service (KMS) and CloudHSM
  • Learn how to secure your AWS accounts using AWS Organizations
  • Understand how to configure and monitor AWS WAF, Firewall Manager, and Shield
  • Learn the fundamentals of access control via federation using AWS Cognito and AWS SSO
Transcript

Amazon Cognito, one of the most annoying parts of building and creating applications, either mobile or web, is dealing with user authentication. Being able to determine who is and who is not allowed to operate specific services or aspects in application is extremely important. However, it can be a tedious and time consuming operation to set up.

In the past, all of that important user information would have been stored in a garden variety user database. This database might've been hosted onsite or even in the cloud. Either way, it was probably a relational database holding tables of usernames with associated permissions.

When working in AWS land, this means the database would either be hosted on RDS, the Relational Database Service, or by running your own database on EC2 instances. The trouble with using either of these methods is it requires a lot of work to get everything set up and maintain the system. We also have the familiar scenario of people working in the corporate environment.

All of their information is already stored in a directory service like Microsoft Active Directory and we don't want them to have to create yet another login and password for our new custom application. We would prefer that they could sign in with their day-to-day corporate username and password. Well, all these pain points can be resolved by using Amazon Cognito, a fairly small service that can do quite a lot of heavy lifting.

About the Author
Avatar
Stuart Scott
AWS Content Director
Students
169772
Labs
1
Courses
139
Learning Paths
96

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 90+ courses relating to Cloud reaching over 140,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.