Tech with Tyler
LinkedInGitHubYouTube
  • 👋Welcome!
    • whoami
    • !!! Disclaimer !!!
  • 🎓Academy
    • AWS Security Cookbook by Tyler
      • AWS Control Tower
        • Lab: Deploying AWS Control Tower via Terraform
      • AWS CloudTrail
      • AWS GuardDuty
        • Lab: Deploying AWS GuardDuty via Terraform
        • Lab: Logging GuardDuty Findings to S3
        • Lab: Adversary Simulation Detection with Stratus Red Team and GuardDuty
      • AWS Organizations
        • Lab: Deploying AWS Organizations via Terraform
      • AWS Root Account Management
        • Lab: Deploying AWS Root Account Management via Terraform
      • AWS Service Control Policies (SCPs)
        • Lab: Deploying AWS Service Control Policies (SCPs) via Terraform
      • TBD - Coming Soon!
        • [TBD] AWS Account Factory
        • [TBD] AWS Identity Center
    • My content on Cybr
      • Course - Terraform on AWS: From Zero to Cloud Infrastructure
      • Lab - Create Static AWS S3 Website with Terraform
      • Lab - Secure EC2 Access with SSM Session Manager and KMS
      • Lab - Encrypt and Decrypt Data with KMS and Data Encryption Keys
    • My content on PwnedLabs
      • Cyber Range - Electra
      • Lab - Abusing Identity Providers in AWS
      • Lab - Prowler and AWS Security Hub
      • Blog - Abusing Identity Providers in AWS
      • Blog - Building Security Guardrails with AWS Resource Control Policies
      • Blog - Defending Against the whoAMI Attack with AWS Declarative Policies
    • My content on YouTube
      • AWS Security Engineering
      • Linux in 60 Seconds!
  • ☁️Cloud Security
    • AWS Attacks and Techniques
      • Enumerate AWS Account IDs
      • Enumerate AWS IAM Users
      • Enumerate (Unauthenticated) IAM Users and Roles
      • Enumerate AWS Public Resources
      • Enumerate Secrets in AWS
      • Generate AWS Console Session
      • Generate IAM Access Keys from CloudShell
      • Password Spraying AWS IAM Users
      • Subdomain Takeovers
    • AWS Privilege Escalation
      • Identity Access Management (IAM)
      • IAM Trust Policies
      • Key Management Service (KMS)
      • Lightsail
      • OpenID Connect (OIDC)
      • S3
      • Secrets Manager
      • Security Token Service (STS)
    • AWS General Info
      • Amazon Bedrock
      • EC2
      • KMS
      • S3
      • SNS Topic
    • AWS CLI Cheat Sheet
    • Capture the Flags (CTFs)
      • Flaws.Cloud
        • Level 1
        • Level 2
        • Level 3
        • Level 4
        • Level 5
        • Level 6
      • PwnedLabs
        • Escalate Privileges by IAM Policy Rollback
        • Exploiting Weak S3 Bucket Policies
        • Leveraging S3 Bucket Versioning
        • S3 Enumeration Basics
        • Pillage Exposed RDS Instances
        • EC2 SSRF Attack
        • Hunt for Secrets in Git Repos
      • Cybr
        • Challenge - Secrets Unleashed
    • Tools
      • Tooling Index
      • dsnap
      • Pacu
      • s3-account-search
      • GoAWSConsoleSpray
      • aws_consoler
      • cloudenum
  • 📦Containers & Orchestration
    • Kubernetes
  • 👨‍💻Coding & CLI Tooling
    • CLI Tools
      • AWS CLI
      • Git
      • GitHub Copilot (CLI)
      • Homebrew
      • jq
      • ngrok
      • ssh
    • Coding and Scripting
      • Bash
      • Python
    • Terminal Customization
  • ⚙️DevSecOps
    • CI/CD
      • GitLab
    • Hashicorp Terraform
    • Hashicorp Vault
    • IAC Scanning
      • tfsec
    • Secrets Scanning
      • Trufflehog
  • 🎁Miscellaneous
    • Jenkins
  • 💻Operating Systems
    • Linux
      • APT Package Manager
      • CLI Tools Cheat Sheet
      • Man Pages
      • Services
      • Users and Groups
  • 🏗️Projects
    • Active Directory Homelab Automation
    • AWS Cloud Resume Challenge
    • Proxmox Homelab as Code
  • 📌Other
    • Useful Resources
Powered by GitBook
On this page
  • Introduction
  • Navigating the Cookbook
  • Cost
  • Getting Started
  • Terraform and the AWS CLI
  • AWS Security Services
  • AWS Use Cases
  • AWS Projects

Was this helpful?

  1. Academy

AWS Security Cookbook by Tyler

Previous!!! Disclaimer !!!NextAWS Control Tower

Last updated 10 hours ago

Was this helpful?

Disclaimer

The AWS Security Cookbook by Tyler is not sponsored by, endorsed by, or otherwise affiliated with Amazon in any official capacity. It contains training and learnings I've put together based on my own experience as a cloud security engineer working with the AWS cloud offering.

Introduction

Hey everyone, I'm Tyler! I'm passionate about cloud security and believe that security engineers should be builders, not just advisors. That's why I created this AWS Security Cookbook by Tyler – to empower you with the hands-on skills to design, deploy, and manage security solutions in the cloud. We'll dive into practical tutorials and ready-to-use Terraform code, equipping you to implement security best practices and accelerate your career growth. Let's get hands-on and build a more secure cloud together!

Navigating the Cookbook

Feel free to explore the modules in any order you want! Each module is self-contained but may occasionally reference code from other modules. While some familiarity with AWS, the AWS CLI, and Terraform is helpful, don't worry if you're just starting out. I've included links to some great resources in the section to help you get up to speed.

This site is powered by GitBook so a few things to keep in mind:

  • There's a navigation menu on the right side to quickly jump to content on the page

  • Each module will also show up on the left side under Academy > AWS Security Cookbook by Tyler

  • Explore the rest of the website for additional cyber security resources

Cost

I'm providing this book and associated labs for absolutely free!

However, AWS is not always free, and you will likely incur some costs when deploying these labs for long periods. Do not let this discourage you! I call out pricing in each lab and provide links to AWS pricing documentation. Personally, I have never spent more than $3 / month.

Just like in the real world, we'll use Terraform to quickly spin up the labs and tear them down when done. This will ensure we leave no resources behind and help us maximize cost savings.


Getting Started

Prepare for your AWS security journey! This section provides the essential tools and knowledge you'll need to confidently tackle the modules ahead.

Terraform and the AWS CLI

If you're serious about building and scaling your cloud infrastructure, prioritize automation. Start by learning Terraform to define and manage your infrastructure as code. Then, master the AWS CLI for rapid automation of tasks and data retrieval. These skills will enable you to deploy faster, reduce errors, and achieve greater agility in your AWS environment.


AWS Security Services

Ready to explore AWS security services? This section provides a deep dive into each service, along with Terraform code so you can deploy them in your environment. Gain a deeper understanding of how each service works, learn best practices, and enhance your cloud security posture. Explore the services below and start building a more secure cloud!


AWS Use Cases

Ready to apply your cloud security knowledge in real-world scenarios? In this section, you'll implement key AWS configurations and security patterns to tackle common challenges. These hands-on use cases will help you build practical skills that you can immediately apply in your cloud environments.


AWS Projects

Ready to roll up your sleeves and build in AWS? This section focuses on hands-on projects that take you through the full process of building and securing real-world applications and infrastructure. You'll gain practical experience that directly translates to the cloud security skills you need. Dive into these in-depth projects, apply best practices, and level up your AWS expertise.

TBD!!

🎓
Getting Started

Terraform on AWS: From Zero to Cloud Infrastructure

Terraform on AWS [Cheat Sheet]

AWS Doc: Getting started with the AWS CLI

Cover

YouTube - Mastering the AWS CLI

Cover

YouTube - Use JQ to Master the AWS CLI

Cover

Monitor activity happening in your AWS accounts

Cover

Multi-account governance, automation, security, and compliance

Cover

Detect threats and malicious activity

Cover

Multi-account governance and security compliance

Cover

Centralize Root account management

Cover

Security guardrails to enforce maximum IAM permissions

Cover

YouTube Implementing Cross-Account Access to S3

Cover

YouTube Configuring a VPC Internet Gateway