Implement a strong identity foundation (least privilege principle), Enable traceability, Apply security to all layers (e.g., edge network, VPC, subnet, load balancer, every instance, operating system), Automate security best practices, Protect data in transit and at rest, Keep people away from data (human error with sensitive data), Prepare for security events with incident management processes