-
Introduction
Security Challenges
Shared Responsibility
Security of the cloud
Security Services in AWS
AWS Security Frameworks
How to prioritize
Evolutive Path
1.
Quick Wins
Security Hub: Best Practices
Avoid using Root
WAF with managed rules
Billing Alarms
Macie: Data Policies
GuardDuty: Threat Detection
CloudTrail: Auditing
Assign security contacts
Limit Security Groups
Multi-Factor Authentication
AWS Trusted Advisor
IAM Access Analyzer
S3 Block Public Access
Select the region(s)
2.
Foundational
KMS: Data Encryption
Use multiple Availability Zones
Centralized user repository
Training plan
Data Backups
Define incident response playbooks
No hardcoded secrets
Regulatory requirements
Identify sensitive data
GuardDuty: Investigate findings
Security in Development
Vulnerabilities in applications
Infrastructure vulnerabilities
Manage instances w/Fleet Manager
Monitor configurations
Network segmentation (VPCs)
SCPs: Organization Policies
Multi-account management
3.
Efficient
Anti-Malware / EDR
Automations in security
Automate deviation correction
Security Champions
Golden Image Pipeline
Control Outgoing traffic
Create your reports for compliance
CIAM: security of your customers
Encryption in transit
IAM Roles: Least Privilege
Integration with SIEM/SOAR
Resilient Architecture Design
Shield Advanced: DDoS Mitigation
Tagging Strategy
Threat Modeling
Using abstract services
Infrastructure as code
VPC Flow Logs Analysis
WAF with Custom Rules
4.
Optimized
Detective: Root cause analysis
Amazon Fraud Detector
Advanced Automations
Red Team
Chaos Engineering
Context-Based Access Control
DevSecOps
Disaster Recovery
Blue Team
IAM Pipeline
Intelligence feeds
Service Catalog: Standardization
Sharing security tasks
--
Maturity Model
-
Events calendar
-
Webinars
-
Assessment Tools
-
Whitepapers, FAQ, others
Frequently Asked Questions
AWS Security Documentation
AWS Security Whitepapers
Free security services
-
Contact
-
Survey
English
Español
Português
Clear History
© 2022 Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Home
>
Introduction
> Security Challenges
Security Challenges
Your browser does not support the video tag.