Security
The ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.
Design Principles
Implement a strong identity foundation
Enable traceability
Apply security at every layer
Automate security
Protect data in transit and at rest
Prepare for security events
Best Practices
Identity and Access Management
Access Control
IAM
Centrally Manage Accounts
AWS Organizations
Identity Authentication
MFA Tokens
Hardware FOBs
Virtual MFA - Google Auth, DUO, etc.
Limited Life Credentials
Temporary Security Credentials
Roles instead of credentials!
Detective Controls
API Access Logs
Resource Inventory
Logs Metric Filters
Threat Detection
Guard Duty
Infrastructure Protection
Isolated Virtual Networks
Vulnerability Detection
DDOS Mitigation
Application Firewall
Data Protection
Data Security Automation
Object Encryption
Incident Response
Infrastructure as Code
Response Team Authorization
IAM
Last updated
Was this helpful?