Page tree
Skip to end of metadata
Go to start of metadata

Resources on monitoring AWS applications and deployments, including best practices and specialized monitoring tools for the Amazon cloud.

Table of Contents:

Below we have compiled publicly available sources from around the world that present views on AWS Monitoring.

Perspectives on AWS Monitoring


Tools


Further Reading

  • Security for AWS PlatformsSecuring the various computing services provided by Amazon Web Services requires a complex combination of technologies and best practices. In this section you'll find resources from around the web on securing specific services on AWS, including Amazon S3, Amazon RDS, Amazon RedShift, EBS, SES, SQS, and more.
    • S3 SecurityResources on how to secure and harden Amazon S3 (Simple Storage Service), an online file storage web service offered by Amazon Web Services. 
    • RDS SecurityResources on how to secure and harden the Amazon Relational Database Service (Amazon RDS), which enables Amazon users to set up, operate, and scale relational databases like MySQL and SQL Server in the cloud. 
    • RedShift SecurityResources on how to secure and harden Amazon Redshift, a fully managed, petabyte-scale data warehouse service on the AWS cloud.
    • Amazon EBS SecurityResources on how to secure and harden Amazon Elastic Block Store (EBS), which provides persistent block level storage volumes for use with Amazon EC2 instances.
    • Amazon SES SecurityResources on how to secure and harden the Amazon Simple Email Service (Amazon SES), a cost-effective email service built on the AWS cloud.
    • Amazon SQS SecurityResources on how to secure and harden Amazon Message Queuing Service (SQS), which helps users of AWS decouple the components of their cloud applications. 
    • Amazon SNS SecurityResources on how to secure and harden the Amazon Simple Notification Service (SNS), a push messaging service that pushes notifications from Amazon cloud apps to mobile devices and distributed services.
    • AWS Auto Scaling SecurityResources on how to secure and harden Amazon's Auto Scaling service, which helps AWS users maintain application availability by dynamically scaling EC2 capacity up or down.
    • Amazon Elastic MapReduce SecurityResources on how to secure and harden Amazon Elastic MapReduce (EMR), a web service that uses Hadoop, an open-source framework, to process vast amounts of data.
  • AWS MonitoringResources on monitoring AWS applications and deployments, including best practices and specialized monitoring tools for the Amazon cloud.
  • AWS Secure Access and SSHResources on how to securely access Amazon Web Services machines, using SSH keys and other methods, and security best practices for remote access on the Amazon cloud.
  • AWS ComplianceResources on compliance with regulations and industry standards on the AWS cloud - HIPAA compliance, ISO 27001 compliance, PCI compliance, and more.
  • AWS Security GroupsResources on defining security groups on AWS services like EC2, VPC and RDS. Security groups act as a virtual firewall that controls the traffic for one or more Amazon instances.
  • AWS FirewallResources on how to setup a firewall on AWS, and tools that enable firewall capabilities on the Amazon cloud. For Amazon's WAF (Web Application Firewall) product, see our AWS WAF page (coming soon).
  • AWS Security-Related Products and FeaturesResources about security products and features provided as part of the Amazon Web Services cloud platform.

Dome9: AWS Network Security and Identity Protection Made Simple

Visualize. Remediate. Enforce.

Start Free Trial

Visualize. Remediate. Enforce.

Bulletproof Security for AWS

  • No labels