Return to Well-Architected Framework Guide
- Protect data, systems, and assets to take advantage of cloud technologies to improve your security
- Implement a strong identity foundation
- Enable traceability
- Apply security at all layers
- Automate security best practices
- Protect data in transit and at rest
- Keep people away from data
- Prepare for security events
- Six best practice areas:
- Security
- Identity and Access Management
- Detection
- Infrastructure Protection
- Data Protection
- Incident Response
Top comments (0)