Chapter 8: Hardening the Security of Your AWS Environment