Reference no: EM133931702
Identity Access Management and Security Operations
Assessment - Final Test
Overview
This assessment consists of two components, a report and a practical component. The report covers design and description of the AWS cloud security builder project and the practical component covers the implementation of the design. The system
Practical component
The practical component of this assessment is to complete the four phases of AWS cloud security builder. Broadly speaking, the goal is to get everything functioning and also secure, as detailed in each phase of AWS cloud security builder lab project.
For the marking, you should complete all the tasks by the time of the due date, and there must be no changes after that point. Once you've done the practicals to your satisfaction before the due date, there is nothing more that you need to do. Just click on End Lab on AWS Academy portal and the markers will examine your work. Get expert online assignment help in the USA.
A detailed list of requirements for the practical components is given in the marking criteria section below.
Report component
The purpose of the report is to document the work that you have built in the practicals. This will follow a methodology similar to that outlined in the lectures and tutorials but will be done manually rather than automatically.
Create an inventory of all data assets and their locations. Classify each data asset according to low, medium or high security.
Create an inventory of all compute and network assets. Give relevant details for all items. Do the research and use your judgement to decide what details are relevant.
Create a network diagram. Include all the compute resources (EC2 instances), database (S3 buckets) networks (subnets), monitoring tools, and connections between compute resources and databases. Be sure to include clients and administrators. Clients will be outsiders who connect to the web server, while administrators connect to ssh.
Create incident response playbook for management to have a high-level overview that how do the incident response plan is implemented in Tasks 4.3 and 4.4.
Part of the exercise is to think carefully about what you should and shouldn't include in your inventories and network diagrams, so we have not been explicit with this. Think about what information you need in order to apply security policies and look in the AWS tutorial slides for ideas about how to create a network diagram.