Please enable JavaScript.
Coggle requires JavaScript to display documents.
AWS Well-Architecture Security - Coggle Diagram
AWS Well-Architecture Security
Security
ability protect information
system
assets
mitigation riskies
Cloud computing
Implementing a strong identity foundation
access control
security layers
best practices
events and automation
Operations in cloud
AWS Acc
AWS Orgs
AWS control tower
IAM
SSO
Secret manager
Strong sign in
Permissions
least privilege
limit access
access require
reduce permissions
Amazon Cognito
unique user/devices
impl sec best practices
login providers
Detective controls
lifecycle control op baselines
internal auditing to examine controls
automated alerting
AWS Config
automate misconfiguration
Infra protection
op system
system sec config
trust boundaries
policy enforcement points
Control traffic all layers
Edge services
AWS Cloud front with WAF
VPC with subnets
use controls available
Use managed services
focus on workload
takes care instances or compute
Data protection
Data classification
restrict
sensitive
public
kms
key managament service
encrypt data and keys
keep people away data
not directly data
provide dashboard
use ci/cd
determine which controls and processes are required
Protection in transit
enforce encryp require
Encrypt data in transit
transit and rest
implement compliance
use aws services
SSL/TLS or/and KMS
cloudFront
RDS
S3
API Gateway
ELB
Certificate manager
Incident Response
Easy way to gain access
Right, pre-deployed tools
Conduct game days regularly