• - Introduction
    • Security Challenges
    • Shared Responsibility
    • Security of the cloud
    • Security Services in AWS
    • AWS Security Frameworks
    • How to prioritize
    • Evolutive Path
  • 1. Quick Wins
    • Security Hub: Best Practices
    • Avoid using Root
    • WAF with managed rules
    • Billing Alarms
    • Macie: Data Policies
    • GuardDuty: Threat Detection
    • CloudTrail: Auditing
    • Assign security contacts
    • Limit Security Groups
    • Multi-Factor Authentication
    • AWS Trusted Advisor
    • IAM Access Analyzer
    • S3 Block Public Access
    • Select the region(s)
  • 2. Foundational
    • KMS: Data Encryption
    • Use multiple Availability Zones
    • Centralized user repository
    • Training plan
    • Data Backups
    • Define incident response playbooks
    • No hardcoded secrets
    • Regulatory requirements
    • Identify sensitive data
    • GuardDuty: Investigate findings
    • Security in Development
    • Vulnerabilities in applications
    • Infrastructure vulnerabilities
    • Manage instances w/Fleet Manager
    • Monitor configurations
    • Network segmentation (VPCs)
    • SCPs: Organization Policies
    • Multi-account management
  • 3. Efficient
    • Anti-Malware / EDR
    • Automations in security
    • Automate deviation correction
    • Security Champions
    • Golden Image Pipeline
    • Control Outgoing traffic
    • Create your reports for compliance
    • CIAM: security of your customers
    • Encryption in transit
    • IAM Roles: Least Privilege
    • Integration with SIEM/SOAR
    • Resilient Architecture Design
    • Shield Advanced: DDoS Mitigation
    • Tagging Strategy
    • Threat Modeling
    • Using abstract services
    • Infrastructure as code
    • VPC Flow Logs Analysis
    • WAF with Custom Rules
  • 4. Optimized
    • Detective: Root cause analysis
    • Amazon Fraud Detector
    • Advanced Automations
    • Red Team
    • Chaos Engineering
    • Context-Based Access Control
    • DevSecOps
    • Disaster Recovery
    • Blue Team
    • IAM Pipeline
    • Intelligence feeds
    • Service Catalog: Standardization
    • Sharing security tasks
  • -- Maturity Model
  • - Events calendar
  • - Webinars
  • - Assessment Tools
  • - Whitepapers, FAQ, others
    • Frequently Asked Questions
    • AWS Security Documentation
    • AWS Security Whitepapers
    • Free security services
  • - Contact
  • - Survey

  • Clear History

© 2022 Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Home > Efficient

3.- Efficient

In this section we will cover the controls and recommendations that allow us to manage security in an efficient way.

Security governance Perform threat modeling
Security assurance Create your reports for compliance (such as PCI-DSS)
Identity and access management Privilege review (Least Privilege) Tagging strategy Customer IAM: security of your customers
Threat detection Integration with SIEM/SOAR Network Flows analysis (VPC Flow Logs)
Vulnerability management Security Champions in Development
Infrastructure protection Image Generation Pipeline Anti-Malware/EDR Outbound Traffic Control Use abstract services
Data protection Encryption in transit
Application security WAF with custom rules Shield Advanced: Advanced DDoS Mitigation
Incident response Automate critical and most frequently run Playbooks Automate deviation correction in configurations Using infrastructure as code (CloudFormation, CDK)