Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.
Overview
Syllabus
Introduction
- Understanding the AWS Well-Architected Framework: The security pillar
- What you should know
- Security pillar overview
- Design principles
- Identity and Access Management
- Demo: IAM security overview
- Protecting AWS credentials
- Identify threats: Detective controls
- AWS detective controls for security
- Implement an auditing workflow
- Challenge: Review a CloudTrail event
- Solution: Review a CloudTrail event
- Auditing and notifications
- Infrastructure protection
- Key AWS services for infrastucture protection
- Data protection methods
- Key AWS services for data protection
- Protecting your data at rest at AWS
- Protecting data in transit at AWS
- Responding to security incidents
- Managing incident response
- Demo: Using the Well-Architected tool
- Next steps
Taught by
Mark Wilkins