From the course: AWS Well-Architected Framework: Security Pillar

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Demo: Using the Well-Architected tool

Demo: Using the Well-Architected tool - Amazon Web Services (AWS) Tutorial

From the course: AWS Well-Architected Framework: Security Pillar

Start my 1-month free trial

Demo: Using the Well-Architected tool

- [Instructor] When it comes to answering questions using the well architected tool as it pertains to the security pillar, well, these will probably be the most contentious discussions because security is something that is real. And there's lots of moving parts in security at AWS because we have all those different layers of our application stacks. On screen, you can see the first question, how do you manage credentials and authentication? And that could delve into single sign on, federations, the types of users that we are using for our mobile applications, how do we authenticate them? There could be many, many different discussions that actually spin off of the big discussion of overall security for this application that we're hosting in the cloud. So certainly the questions in this pillar are going to apply to this workload. On screen you can also see on the right some great videos. There is a number of best practice…

Contents