From the course: Hands-On Development in AWS
Unlock this course with a free trial
Join today to access over 24,400 courses taught by industry experts.
Using CloudFormation best practices - Amazon Web Services (AWS) Tutorial
From the course: Hands-On Development in AWS
Using CloudFormation best practices
- Some best practices for cloud formation. It is of course recommended. I don't think you have an option. Use IAM to control access to the cloud formation service itself. If you have a pretty complicated template and it is deployed as a stack, what's going to happen if some rogue administrator comes along and deletes that stack? It's going to destroy all of the resources that are provisioned as part of that stack. So, be careful with your access to cloud formation and the service. Reuse templates to replicate stacks in multiple environments. There's no reason you can't have this template deployed in Ohio, take the template deploy it in Europe and then use some global Route 53 awesomeness in order to direct traffic to the various resources based on the user's general location. You can nest stacks to reuse common template patterns. It is recommended to do so. Do not put credentials in your templates. These are plain-text documents and if you store these in some sort of insecure…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Module 2: AWS foundational services introduction24s
-
(Locked)
Learning objectives32s
-
(Locked)
Understanding IAM11m 55s
-
(Locked)
Understanding permissions11m 37s
-
Exploring users and groups8m 58s
-
(Locked)
Exploring roles5m 13s
-
(Locked)
Using IAM multi-factor authentication (MFA)4m 18s
-
(Locked)
Creating a Cognito user pool15m 12s
-
(Locked)
-
-
(Locked)
Module 3: Database and storage services introduction19s
-
(Locked)
Learning objectives27s
-
(Locked)
An RDS overview8m 47s
-
(Locked)
Understanding database security in RDS2m 48s
-
(Locked)
Configuring an RDS database9m 9s
-
(Locked)
Scaling RDS4m 30s
-
(Locked)
Exploring database on EC25m 12s
-
(Locked)
Using RDS best practices2m 16s
-
(Locked)
-
-
(Locked)
Learning objectives23s
-
(Locked)
Understanding S310m 42s
-
(Locked)
Creating buckets12m 17s
-
(Locked)
Securing S37m 33s
-
(Locked)
Using global data replication6m 11s
-
(Locked)
Understanding Glacier5m 34s
-
(Locked)
Exploring events8m 48s
-
(Locked)
Using third-party browser tools2m 34s
-
(Locked)
Using S3 best practices2m 47s
-
(Locked)
Using CloudFront with S316m 18s
-
(Locked)
-
-
(Locked)
Module 4: Messaging services introduction29s
-
(Locked)
Learning objectives31s
-
(Locked)
Understanding SQS10m 25s
-
(Locked)
Creating an SQS queue3m 39s
-
(Locked)
Securing SQS5m 53s
-
(Locked)
Interacting with an SQS queue12m 32s
-
(Locked)
Using message encryption4m 42s
-
(Locked)
Using SQS best practices2m 36s
-
(Locked)
-
-
(Locked)
Module 5: Execution services introduction24s
-
(Locked)
Learning objectives27s
-
(Locked)
Highlighting Lambda6m 6s
-
(Locked)
Understanding Lambda scalability and availability3m 24s
-
(Locked)
Exploring Lambda security3m 43s
-
(Locked)
Using Lambda functions10m 42s
-
(Locked)
Deploying a Lambda function8m 32s
-
(Locked)
Using Lambda best practices5m 8s
-
(Locked)