15 minutes
It includes the ability to protect information system & assets while delivering business value through risk assessment & mitigation strategies.
1. Implement a Strong Identity Foundation.
- Centralize privilage management and reduce (or even eliminate) on long term credentials
- Follow Principle of least privilage. (using AWS IAM)
2. Enable Tracablity.
- Integrate logs & metrics with systems to automate responses & take action.
3. Apply Security at all layers
- Like Edge Networks, VPC, Subnets, Load Balancers, every EC2 instance, OS and applications.
4. Automate Security Best Practices
5. Protect data (at-rest & in-transit) : Encryption, Tokenization, Access Control.
6. Keep people away form data: Reduce or eliminate need for direct access or manual processing of data.
7. Prepare for Security Events: Run Incident Response Simulations & use tools with automation to increase your speed for detection, investigation & recovery.