From the course: AWS Well-Architected Framework: Security Pillar
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Demo: Using the Well-Architected tool - Amazon Web Services (AWS) Tutorial
From the course: AWS Well-Architected Framework: Security Pillar
Demo: Using the Well-Architected tool
- [Instructor] When it comes to answering questions using the well architected tool as it pertains to the security pillar, well, these will probably be the most contentious discussions because security is something that is real. And there's lots of moving parts in security at AWS because we have all those different layers of our application stacks. On screen, you can see the first question, how do you manage credentials and authentication? And that could delve into single sign on, federations, the types of users that we are using for our mobile applications, how do we authenticate them? There could be many, many different discussions that actually spin off of the big discussion of overall security for this application that we're hosting in the cloud. So certainly the questions in this pillar are going to apply to this workload. On screen you can also see on the right some great videos. There is a number of best practice…
Contents
-
-
-
-
-
-
(Locked)
Data protection methods2m 18s
-
Key AWS services for data protection3m 15s
-
(Locked)
Protecting your data at rest at AWS1m 50s
-
(Locked)
Protecting data in transit at AWS2m 43s
-
(Locked)
Responding to security incidents2m 33s
-
(Locked)
Managing incident response4m 27s
-
(Locked)
Demo: Using the Well-Architected tool2m 9s
-
(Locked)
-