– This model is not part of AWS official documentation. It’s a set of opinionated prescriptive guidance built by a team of AWS Security specialists and validated through dozens of peer reviews (not a formal process).
– It is currently being used by over 100 AWS Solutions Architects to improve the security posture of their customers and had over 40.000 unique users in the last 12 months.
– Please review the Introduction section to understand the prioritization criteria, as it does not follow the typical approach.
– This document does not intend to replace Well-Architected or CAF, it’s intended to help with prioritization and simplify learning.