Final answer:
A company can secure an AWS-deployed application by managing access with AWS IAM, protecting against web exploits with AWS WAF, encrypting data with SSL/TLS, patching regularly, monitoring API activity with AWS CloudTrail, and enabling AWS Shield against DDoS attacks.
Step-by-step explanation:
To secure an application deployed in the AWS Cloud, a company can take several steps. First, using AWS Identity and Access Management (IAM) is critical for managing access and permissions to AWS resources securely. This is the first step in ensuring that only authorized users or systems can access certain data or services within AWS.
Enabling the AWS Web Application Firewall (WAF) can help protect the application against common web exploits such as SQL injection and cross-site scripting. Implementing SSL/TLS encryption is essential for secure data transmission to ensure that data in transit between the user and the application is encrypted.
It is also imperative to regularly update and patch the application and infrastructure to protect against new vulnerabilities. Tracking and logging API activity through AWS CloudTrail is an important measure for auditing and identifying potentially unauthorized actions. Lastly, enabling AWS Shield provides additional protection against Distributed Denial of Service (DDoS) attacks to maintain the availability of the service.