Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Data Wrangling on AWS

You're reading from  Data Wrangling on AWS

Product type Book
Published in Jul 2023
Publisher Packt
ISBN-13 9781801810906
Pages 420 pages
Edition 1st Edition
Languages
Authors (3):
Navnit Shukla Navnit Shukla
Profile icon Navnit Shukla
Sankar M Sankar M
Profile icon Sankar M
Sampat Palani Sampat Palani
Profile icon Sampat Palani
View More author details

Table of Contents (19) Chapters

Preface Part 1:Unleashing Data Wrangling with AWS
Chapter 1: Getting Started with Data Wrangling Part 2:Data Wrangling with AWS Tools
Chapter 2: Introduction to AWS Glue DataBrew Chapter 3: Introducing AWS SDK for pandas Chapter 4: Introduction to SageMaker Data Wrangler Part 3:AWS Data Management and Analysis
Chapter 5: Working with Amazon S3 Chapter 6: Working with AWS Glue Chapter 7: Working with Athena Chapter 8: Working with QuickSight Part 4:Advanced Data Manipulation and ML Data Optimization
Chapter 9: Building an End-to-End Data-Wrangling Pipeline with AWS SDK for Pandas Chapter 10: Data Processing for Machine Learning with SageMaker Data Wrangler Part 5:Ensuring Data Lake Security and Monitoring
Chapter 11: Data Lake Security and Monitoring Index Other Books You May Enjoy

Data lake security

In this section, we will discuss bout various options and methodologies to enhance the security aspects of your data lake. We will talk about security across multiple layers; however, this should only be considered a starting point. You will have to work more and add additional security layers as applicable to your project.

Data lake access control

To secure a data lake, we can use a combination of user-based access policies and resource-based access policies. User policies are attached to users/roles and control the actions that a user/role can perform within an account. In addition to user-based control policies, we can attach access policies to resources such as Amazon S3, Amazon SQS, and more, to control access specifically for that resource. This provides another layer of security for protecting AWS resources. As a general best practice, the access policies should be kept least privilege to allow only required actions with specific conditions.

User...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}