From the course: Complete Guide to the AWS Well-Architected Framework
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Security pillar overview - Amazon Web Services (AWS) Tutorial
From the course: Complete Guide to the AWS Well-Architected Framework
Security pillar overview
- [Instructor] We know that the Well-Architected Framework is trying to help us understand the pros and the cons of any design decisions that we're making when we're starting to build systems to host our applications on AWS. The security pillar, obviously, is a little more focused on security, so we're looking at best practices for architecting our systems as securely as possible at AWS. They follow the format in this manner. First of all, we've got to make it secure. Next, we've got to make it reliable. Then after we've got security and reliability figured out, let's make it as fast as we can, but it always starts with security. So looking at the best practices for architecting your secure system means you have to look at what the recommendations are and decide if you agree. It may not match up with what you're trying to do at AWS, but getting that education is kind of imperative for making the right decision. So we want to protect the information used by our application, that data…
Contents
-
-
-
-
-
-
(Locked)
Security pillar overview2m 21s
-
(Locked)
Design principles7m 14s
-
(Locked)
Identity and Access Management2m 59s
-
(Locked)
Demo: IAM security overview4m 51s
-
(Locked)
Protecting AWS credentials3m 54s
-
(Locked)
Identify threats: Detective controls3m 25s
-
(Locked)
AWS detective controls for security4m 29s
-
(Locked)
Implement an auditing workflow3m 37s
-
(Locked)
Challenge: Review a CloudTrail event56s
-
(Locked)
Solution: Review a CloudTrail event1m 23s
-
(Locked)
Auditing and notifications4m 46s
-
(Locked)
Infrastructure protection4m 57s
-
(Locked)
Key AWS services for infrastructure protection5m 55s
-
(Locked)
Data protection methods2m 18s
-
(Locked)
Key AWS services for data protection3m 15s
-
(Locked)
Protecting your data at rest at AWS1m 50s
-
(Locked)
Protecting data in transit at AWS2m 43s
-
(Locked)
Responding to security incidents2m 33s
-
(Locked)
Managing incident response4m 27s
-
(Locked)
Demo: Using the Well-Architected Tool2m 12s
-
(Locked)
-
-
-
-
-