Summary

In this chapter, we reviewed some of the strategies you can follow for achieving security in your cloud application. We emphasized on the best practices of implementing security using the AWS services. We followed this up with several sections on setting up security in our sample application.

In the next chapter, we will shift our focus to production deployments, go-live planning, and operations. We will also discuss data backups and restores and application monitoring and troubleshooting. We will also include a hands-on section that will walk you through these processes for our sample application.

Get Learning AWS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.