Conceptos generales de seguridad
Por qu茅 Ciberseguridad para Desarrollo Web
No estamos seguros
Autorizaci贸n Autenticaci贸n y Accountability : AAA
Funciona en mi local
Empecemos por la l贸gica
SQL Injection
De local a producci贸n
Introducci贸n a DevSecOps
DevSecOps como cultura
Creando pipelines
Corriendo nuestras pruebas
Listas de control de privilegios
Seguridad en la arquitectura
Dise帽ando la arquitectura
Infraestructura como c贸digo
Creando la infraestructura
Creando roles y policies
Desplegando funciones lambda
El mundo de la Base de Datos
Conectando lambdas a una VPC
Single point of failure
Evitando vulnerabilidades en el c贸digo
Configurando Auth0
Creando un lambda Authorizer
Secretos y API Keys
Creando Endpoints
Evitando Cross Site Scripting o XSS
Validando la integridad de los datos con tokens
Controles de seguridad sobre datos
Conociendo la naturaleza de los datos
Protege tus datos con Key Management Services
Monitoring y alertas
Sistema de logs
Observabilidad
Alertas y Postmortems
CORS y cierre
Errores de CORS
You don't have access to this class
Keep learning! Join and start boosting your career
In the world of cloud development and deployment, it's essential to not only think about functionality, but also security. Welcome to this exploration of designing a secure architecture on AWS! As we move forward, we'll discover how to ensure that your projects are not only efficient, but also secure and economically viable.
The key to a secure architecture on AWS lies in the principle of "last privilege". This approach consists of granting each resource or user only the minimum permissions necessary to do their job. In this way, we avoid the common mistakes of granting excessive permissions, such as with admin users.
One of the advantages of working with AWS is the ability to manage costs efficiently, but it is also essential to avoid billing surprises.
To make sure you keep costs in check, you can set up budget alerts:
This approach ensures that you will be able to work within the free trial and react to any unforeseen spending attempts.
Access Control Lists (ACLs) are vital tools for defining who or what can interact with elements of your AWS architecture. While they are not the security principle itself, they function as the mechanism for implementing it.
With budget preparation and an understanding of permissions, you're ready to start building.
Each of these approaches not only ensures effective technical implementation, but also solid budget protection. So go ahead, assemble your architecture securely and efficiently on AWS. Your project will be robust and reliable, allowing you to grow with confidence - keep learning and building!
Contributions 2
Questions 0
Want to see more contributions, questions and answers from the community?