Security

The ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.

Design Principles

  • Implement a strong identity foundation

  • Enable traceability

  • Apply security at every layer

  • Automate security

  • Protect data in transit and at rest

  • Prepare for security events

Best Practices

Identity and Access Management

  • Access Control

    • IAM

  • Centrally Manage Accounts

    • AWS Organizations

  • Identity Authentication

    • MFA Tokens

      • Hardware FOBs

      • Virtual MFA - Google Auth, DUO, etc.

  • Limited Life Credentials

    • Temporary Security Credentials

    • Roles instead of credentials!

Detective Controls

Infrastructure Protection

Data Protection

Last updated

Was this helpful?