| Security governance | Forming a Chaos Engineering team (Resilience) Sharing security work and responsibility |
| Security assurance | |
| Identity and access management | Context-based access control IAM Policy Generation Pipeline |
| Threat detection | Amazon Fraud Detector Integration with additional intelligence feeds |
| Vulnerability management | |
| Infrastructure protection | Process standardization with Service Catalog |
| Data protection | |
| Application security | DevSecOps Forming a Red Team (Attacker's Point of View) |
| Incident response | Automate most playbooks Amazon Detective: Root cause analysis Forming a Blue Team (Incident Response) Multi-region disaster recovery automation |