placing your order...Don't refresh or navigate away from the page.
You’ve been hired to bring security controls to QryptoTremolo’s AWS accounts. The startup, which develops next-generation financial services, chose to develop and operate in AWS. QryptoTremolo’s development teams have had unfettered access to the AWS accounts, and ad hoc development has evolved organically, increasing the risk for security breaches. It’s up to you to lower this risk so that the company doesn’t end up on the front-page news…for the wrong reasons. Using CloudFormation, stack sets, and the AWS CLI, you’ll set up AWS Config with rules to preemptively discover resources that aren’t configured according to security best practices.
This liveProject is for security engineers with intermediate experience in AWS and infrastructure as code. To begin these liveProjects you’ll need to be familiar with the following:TOOLS
Note: These exercises rely upon the AWS platform, which may carry usage costs.
In this liveProject, you’ll learn to iteratively develop the infrastructure as code in the form of CloudFormation templates and address cross-account automation issues including security.
geekle is based on a wordle clone.