Cloud Virtualization with AWS - benjamin-s-hobbs/reading-notes GitHub Wiki

  • Relevance - The Cloud (in general) is a really progressive technology that's being talked a lot about lately. In practice, it's really just the ability to store and host- well almost everything- online. An InfoSec professional that I think of as a mentor, Marsha Wilson-CEO of ScaleSec actually specializes in providing Cloud Security Solutions and in discussions with her I learned that it's possible that in the future, cloud services will be available and provided more like utilities. In order to get to that level, so much more has to happen: Laws, policies, more competition [Aside from Google/Amazon/Microsoft], and-of course security (looking at YOU, CISA.) Keep your eye on Cloud. From Cloud to Edge Computing- it's getting closer and closer to the end users.

Importance of Virtualization in the Amazon EC2 Cloud

From J. Jozerack "Importance of Virtualization in the Amazon EC2 Cloud" https://www.joe0.com/2017/06/11/importance-of-virtualization-in-the-amazon-ec2-cloud/ Updated June 11, 2017 (accessed May 9, 2023)

What is Virtualization?

Virtualization and the Amazon IaaS Cloud Service Model

AWS Cloud Practitioner Essentials: Core Services

From https://explore.skillbuilder.aws/learn/course/external/view/elearning/1990/aws-cloud-practitioner-essentials-core-services (accessed May 9, 2023)

  • ENROLL in this please- Skill up #goals

Privileged Access Cloud Security for Dummies

From https://www.dummies.com/wp-content/uploads/Privileged-Access-Cloud-Security-For-Dummies-Thycotic-Special-Edition.pdf (accessed May 9, 2023)

  • Typical Cloud Services

    • Infrastructure as a Service (IaaS)

    • Platform as a Service (PaaS)

    • Software as a Service (SaaS)

    • Hardware as a Service (HaaS)

    • Security Software as a Service or Managed Security as a Service Provider (SECSaaS) / (MSSP)

Spotting Key Cloud Security Differences

  • Benefits of Cloud Security

  • Cloud Security Access Challenges

Securing Privileged Cloud Access

  1. Mapping Cloud Apps and Data

  2. Approaching Privileged Cloud Access

  3. Best Practices

    • Enable Widespread Least-Privilege Access Security

    • Automate Access to Make Security Work for You

    • Integrate Solutions to Create a Security Society

    • Minimize User Friction by Implementing Usable Security Solutions

    • Move Beyond Zero Trust to Adaptive Risk-Based Trust

What I want to know more about

How useful is the AWS Cloud Practitioner Cert? Have you heard of the CloudResumeChallenge... Have you done it?