Free, comprehensive security reference guides for every major AWS service. Attack vectors, misconfigurations, CLI commands, and detection indicators.
By Toc Consulting - AWS Security & Cloud Architecture
75 cards found
Identity & Access Management - Users, roles, policies
Simple Storage Service - Buckets & objects
Elastic Compute Cloud - Instances & IMDS
Serverless compute - Functions & triggers
Key Management Service - Encryption keys & cryptographic operations
Relational Database Service - Databases & snapshots
Secret storage & rotation
Virtual Private Cloud - Network isolation & security groups
Elastic Container Service - Container orchestration
Elastic Kubernetes Service - Managed Kubernetes
Elastic Load Balancing - Traffic distribution
Security Token Service - Temporary credentials & role assumption
Elastic Block Store - Volumes & snapshots
Elastic File System - Managed NFS storage
User pools & identity federation
Certificate Manager - SSL/TLS certificates
Content Delivery Network - Edge caching & distribution
API logging & audit trail
Threat detection service
Multi-account management - SCP configuration
Systems Manager - Remote management
Simple Notification Service - Message routing
Simple Queue Service - Message queuing
NoSQL database - Tables & streams
REST/WebSocket APIs - Authorization & throttling
DNS service - Domain management
Monitoring & observability - Logs & metrics
Event bus - Event routing & rules
ETL & Data Catalog - Data transformation
SQL query service - Data lake queries
Real-time streaming - Data ingestion
Workflow orchestration - State machines
CI/CD services - Build & deploy pipelines
Container registry - Image management
Backup vaults & recovery points
Web Application Firewall - Rule management
Redis & Memcached - In-memory caching
Search & analytics - Dashboards & indices
Data warehouse - Business analytics
Vulnerability scanning - Automated assessment
Configuration compliance - Rule evaluation
SFTP/FTPS service - File transfer
GraphQL APIs - Real-time data sync
Job execution - Batch processing
Managed Active Directory - Domain services
Machine learning - Model training & deployment
Foundation models - LLM APIs & guardrails
Managed Kafka - Streaming & topics
Container deployment - Auto-scaling apps
Redis compatible - Durable in-memory database
Frontend hosting - Full-stack deployment
Data transfer - Cross-environment sync
Data lake governance - Fine-grained access
Managed firewall - Suricata rules
Infrastructure as Code - Stack provisioning
SSO federation - Multi-account access
Security posture - Finding aggregation
Network hub - Cross-VPC routing
Resource sharing - Cross-account access
Data security - Sensitive data discovery
Hardware Security Module - FIPS 140-3 Level 3 key management
DDoS protection - Standard and Advanced with SRT
Security investigation - Behavior graphs from CloudTrail, VPC, GuardDuty
Central firewall management - WAF, SG, Network Firewall policies
Zero trust network access - Cedar policies and trust providers
Landing zone governance - Guardrails, SCPs, account factory
Hadoop/Spark clusters - IMDS, web UIs, step injection
Application deployment - Service roles, .ebextensions, env vars
Virtual desktops - AD integration, credential harvesting
MongoDB-compatible database - NoSQL injection, snapshots
Graph database - Gremlin/SPARQL injection, notebooks
BI dashboards - Data source exposure, embedded leaks
Simplified compute - Default SSH keys, open firewalls
Distributed tracing - Sensitive data in traces, C2 abuse
Cedar authorization - Policy logic flaws, schema bypass