Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.
- [Mark] Mark Wilkins here. Welcome aboard to the Well-Architected Framework. Specifically the security pillar, because after all, we're all worried about security breaches if we're operating in the cloud. So, if you're getting ready to host applications at AWS, why wouldn't you follow the best practices that have been produced by Amazon talking to customers, like you, and coming up with really good best practices to help you out. We're going to look at all aspects of security for all aspects of our application stack, including security for users, security for the applications themselves. What do we do when there's attacks? How can we automate some of the responses? I think this would be a really good use of your time taking the security pillar class with me and getting a really solid understanding of what security tools and processes are available at AWS for you to use to help your applications that are hosted at AWS. I hope to see you in class.
- Design principals
- Identity and Access Management (IAM)
- Protecting AWS credentials
- Identifying threats
- Auditing security
- Infrastructure protection
- Protecting data at rest and in transit
- Responding to security incidents
- Managing incident response