These five pillars help companies focus on the value of the cloud: digital and operational transformation. Continue reading
Series: Five Pillars for well-architected AWS security
Organizations who follow a well-architected AWS security methodology will create a framework that not only supports their cloud strategies, but actually increases their security in the cloud, and their ability to respond to how the cloud evolves. A seven-part series by Rich Turner.
The fifth pillar to well-architected AWS cloud security – IR (Incident Response)
Incident Response (IR) is often the first symptom of a poorly architected cloud security framework.Continue reading
The fourth pillar to well-architected AWS cloud security – Data Protection
Data protection for the network is often equated to backup, but the functions are different.Continue reading
The third pillar to well-architected AWS cloud security – NetSec (Network Security)
The AWS Shared Security Model guarantees security of the network, not the companies accessing it.Continue reading
The second pillar to well-architected AWS cloud security – Detective Controls
IDS controls are very valuable to resource managers and IT for a variety of reasonsContinue reading
The first pillar for well-architected AWS cloud security – IAM (identity access management)
Traditionally, customers look at IAM from the standpoint of users. Users, which can be further categorized into groups, will also have associated roles, and permissions associated to these roles.Continue reading
Five Pillars for well-architected AWS security
An introduction to the AWS Well-Architected Security Model. A series by Rich Turner. Continue reading