Four principles of a strong Identity foundation
Design principles which instituting traceability
- integrate log and metric collection with systems to automatically take action
Define the principle of security in depth
Design practices that facilitate automating security best practices
Design principles for protecting data
Design Principle: Keep people away from data
Steps to prepare for security events
- run response simulations and use tools to automate the detection, investigation and recovery
Five areas of cloud security
Workload security best practices
AWS Accounts
AWS Organizations
Service Control Policy (SCP)
AWS Control Tower
Identity Management: Types
Identity Management: Federation
AWS SSO
AWS Directory Service
Amazon Cognito
IAM Best Practices
IAM management access best practices
IAM consumer access best practices
IAM roles for Amazon EC2
AWS Systems Manager
Permissions best practices