AWS Security

Organizations Service Control Policy you own this product

This project is part of the liveProject series AWS Security: Audit and Intrusion Detection Automation
prerequisites
basic knowledge of *nix/bash command shell • basic knowledge of the Git version control system • basic hands-on experience with AWS CloudFormation • basic hands-on experience with the AWS CLI
skills learned
develop Security Control Policies • develop and test boto code • invoke the IAM Policy Simulator
Eric Kascic
1 week · 6-8 hours per week · INTERMEDIATE
filed under

placing your order...

Don't refresh or navigate away from the page.
liveProject This project is part of the liveProject series AWS Security: Audit and Intrusion Detection Automation liveProjects give you the opportunity to learn new skills by completing real-world challenges in your local development environment. Solve practical problems, write working code, and analyze real data—with liveProject, you learn by doing. These self-paced projects also come with full liveBook access to select books for 90 days plus permanent access to other select Manning products. $19.99 $29.99 you save $10 (33%)
Organizations Service Control Policy (liveProject) added to cart
continue shopping
adding to cart

Look inside

In this liveProject, you’ll leverage organizations service control policies to protect administrative and security resources in the accounts used by development teams where these teams have privileged access. Specifically, you will add automation to restrict access of local administrators (and intruders!) to any AWS CloudTrail and Amazon GuardDuty resources located in the accounts. Without these protections, the security controls we have put in place for audit, forensic analysis, and intrusion detection can be interfered with by the local administrators.

This project is designed for learning purposes and is not a complete, production-ready application or solution.

book resources

When you start your liveProject, you get full access to the following books for 90 days.

project author

Eric Kascic

Eric Kascic is a software developer with 25 years of professional experience. He has developed software solutions across a variety of business domains including telecommunications, medical imagery, and financial services. He has developed embedded, desktop, and server-side software, and has specialized in creating build, deployment, and test automation systems.

Since 2013, he has primarily focused on the AWS platform. At Stelligent, a boutique consulting firm that traditionally specialized in CI/CD, DevOps, and AWS automation, he developed CI/CD solutions for the AWS platforms of financial services companies. In developing infrastructure-as-code solutions, security was a primary focus. Eric invented the cfn_nag tool in 2016 to perform static analysis on CloudFormation templates to help customers prevent deploying unsecured AWS resources (such as those missing encryption or with overly permissive access).

He is currently a principal security engineer at a financial services company where he develops software to support security processes including automation of AWS IAM role creation, as well as a platform to detect and remediate insecure AWS resources across hundreds of accounts. Eric has published several articles relevant to security automation in AWS, including articles about cfn_nag, IAM, CloudFormation, and CI/CD.

prerequisites

This liveProject series is intended for security engineers with intermediate experience in AWS and infrastructure as code. You will need to be familiar with the following:


TOOLS
  • Basic knowledge of *nix/bash command shell, including pipes, redirection, command substitution
  • Basic knowledge of the Git version control system
  • Basic hands-on experience with AWS CloudFormation
  • Basic hands-on experience with the AWS CLI
  • Basic knowledge of IAM and assuming cross-account IAM roles
  • Intermediate knowledge of AWS accounts and AWS Organizations
  • Intermediate knowledge of Python 3 programming including: lists, dicts, loops, comprehensions, functions, conditionals
TECHNIQUES
  • Intermediate understanding of cloud computing and the AWS platform
  • Basic understanding of “infrastructure as code”
  • Basic understanding of security concepts

Note: For all milestones in this project beware that it costs money to deploy AWS resources and leave them running. The costs depend upon the type of resource.

you will learn

In this liveProject, you’ll write boto to deploy and test organizations service control policies. Then you’ll fit the deployment and test execution into CodeBuild “pipelines” to allow for quick changes in production.


  • Develop security control policies
  • Develop and test boto code
  • Invoke the IAM Policy Simulator

features

Self-paced
You choose the schedule and decide how much time to invest as you build your project.
Project roadmap
Each project is divided into several achievable steps.
Get Help
While within the liveProject platform, get help from other participants and our expert mentors.
Compare with others
For each step, compare your deliverable to the solutions by the author and other participants.
book resources
Get full access to select books for 90 days. Permanent access to excerpts from Manning products are also included, as well as references to other resources.
RECENTLY VIEWED