AWS Well-architected Framework - Security Pillar
Security Design Principles
Implement Strong Identity Management Foundation
Ensure Traceability
Apply Security at All Layers
Automate Security Best Practices
Protect Data in Transit and at Rest
Maximize Isolation of Users from Data
Prepare Adequately for Security Events
1. Security Governance
Sec 1) How securely are you operating your workloads?
AWS Account Planning
AWS Landing Zone
AWS Control Tower
2. Identity & Access Management
Sec 2) How do you manage identities for users and systems?
AWS SSO
Credential Report & Config Rule
Config Rule
AWS Secret Manager

Server User Management Cases
1. AWS AD Domain Join
2. Session Manager
3. Instance Connect
Sec3) How do you manage permissions for users and systems?
IAM Access Advisor
IAM Access Analyzer
IAM Policy - Permission Boundary

Hands-On: Incident Response Workshop in AWS Environment
Look it up
Last updated