1/8 AWS Aurora Security ๐งต๐
๐จ Content Creator: @jerry__chang
#AWS #Database #PostgreSQL #MySQL
2/8 Isolate the resources from the internet (not publicly accessible)
3/8 Leverage security groups to control network traffic for the individual resources.
4/8 Use Encryption in-transit for connections to the database.
5/8 Use a secure encrypted storage for password storage.
6/8 Encrypt the data at rest (using AWS KMS).
7/8 Monitor activity using AWS Cloudtrail and Cloudwatch.
8/8 Use a firewall (ie AWS WAF) as a gateway for client facing applications accessing the database.
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.