Security governance | Sharing security work and responsibility |
Security assurance | Automate Evidence Gathering |
Identity and access management | IAM Data Perimeters IAM Policy Generation Pipeline Temporary Elevated Access |
Threat detection | Threat Intelligence Network Flows analysis (VPC Flow Logs) |
Vulnerability management | Vulnerability Management Team |
Infrastructure protection | Zero Trust Access Use abstract services |
Data protection | GenAI Data protection |
Application security | Forming a Red Team (Attacker's Point of View) |
Incident response | Forming a Blue Team (Incident Response) Advanced security automations Security Orchestration & Ticketing Automate deviation correction in configurations |
Resiliency | Multi-region Disaster Recovery Automation Chaos Engineering |