• - Introduction
    • Security Challenges
    • Shared Responsibility
    • Security of the cloud
    • Security Services in AWS
    • AWS Security Frameworks
    • How to prioritize
    • Evolutive Path
  • 1. Quick Wins
    • Security Hub: Best Practices
    • Avoid using Root
    • WAF with managed rules
    • Billing Alarms
    • Macie: Data Policies
    • GuardDuty: Threat Detection
    • CloudTrail: Auditing
    • Assign security contacts
    • Limit Security Groups
    • Multi-Factor Authentication
    • AWS Trusted Advisor
    • IAM Access Analyzer
    • S3 Block Public Access
    • Select the region(s)
  • 2. Foundational
    • KMS: Data Encryption
    • Use multiple Availability Zones
    • Centralized user repository
    • Training plan
    • Data Backups
    • Define incident response playbooks
    • No hardcoded secrets
    • Regulatory requirements
    • Identify sensitive data
    • GuardDuty: Investigate findings
    • Security in Development
    • Vulnerabilities in applications
    • Infrastructure vulnerabilities
    • Manage instances w/Fleet Manager
    • Monitor configurations
    • Network segmentation (VPCs)
    • SCPs: Organization Policies
    • Multi-account management
  • 3. Efficient
    • Anti-Malware / EDR
    • Automations in security
    • Automate deviation correction
    • Security Champions
    • Golden Image Pipeline
    • Control Outgoing traffic
    • Create your reports for compliance
    • CIAM: security of your customers
    • Encryption in transit
    • IAM Roles: Least Privilege
    • Integration with SIEM/SOAR
    • Resilient Architecture Design
    • Shield Advanced: DDoS Mitigation
    • Tagging Strategy
    • Threat Modeling
    • Using abstract services
    • Infrastructure as code
    • VPC Flow Logs Analysis
    • WAF with Custom Rules
  • 4. Optimized
    • Detective: Root cause analysis
    • Amazon Fraud Detector
    • Advanced Automations
    • Red Team
    • Chaos Engineering
    • Context-Based Access Control
    • DevSecOps
    • Disaster Recovery
    • Blue Team
    • IAM Pipeline
    • Intelligence feeds
    • Service Catalog: Standardization
    • Sharing security tasks
  • -- Maturity Model
  • - Events calendar
  • - Webinars
  • - Assessment Tools
  • - Whitepapers, FAQ, others
    • Frequently Asked Questions
    • AWS Security Documentation
    • AWS Security Whitepapers
    • Free security services
  • - Contact
  • - Survey

  • Clear History

© 2022 Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Home > Foundational

2.- Foundational

In this section you will find controls and recommendations that may take some more effort to implement, but are very important.

Security governance Identify security and regulatory requirements Cloud Security Training Plan
Security assurance Configuration monitoring with AWS Config
Identity and access management Centralized user repository Organization Policies - SCPs
Threat detection Investigate most Amazon GuardDuty findings
Vulnerability management Manage vulnerabilities in your infrastructure and perform pentesting Manage vulnerabilities in your applications
Infrastructure protection Manage your instances with Fleet Manager Network segmentation - Public/Private Networks (VPCs) Multi-account management with AWS Control Tower
Data protection Data Encryption - AWS KMS Backups Discover sensitive data with Amazon Macie
Application security Involve security teams in development No secrets in your code - AWS Secrets Manager
Incident response Define incident response playbooks - TableTop Exercises Redundancy using multiple Availability Zones