Security governance | Forming a Chaos Engineering team (Resilience) Sharing security work and responsibility |
Security assurance | |
Identity and access management | Context-based access control IAM Policy Generation Pipeline |
Threat detection | Amazon Fraud Detector Integration with additional intelligence feeds |
Vulnerability management | |
Infrastructure protection | Process standardization with Service Catalog |
Data protection | |
Application security | DevSecOps Forming a Red Team (Attacker's Point of View) |
Incident response | Automate most playbooks Amazon Detective: Root cause analysis Forming a Blue Team (Incident Response) Multi-region disaster recovery automation |