Skip to main content

๐Ÿ’ผ Protecting Compute

  • ID: /frameworks/aws-well-architected/sec/06

Descriptionโ€‹

Compute resources include EC2 instances, containers, AWS Lambda functions, database services, IoT devices, and more. Each of these compute resource types require different approaches to secure them. However, they do share common strategies that you need to consider: defense in depth, vulnerability management, reduction in attack surface, automation of configuration and operation, and performing actions at a distance. In this section, you will find general guidance for protecting your compute resources for key services. For each AWS service used, itโ€™s important for you to check the specific security recommendations in the service documentation.

Similarโ€‹

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ SEC06-BP01 Perform vulnerability managementno data
๐Ÿ’ผ SEC06-BP02 Provision compute from hardened imagesno data
๐Ÿ’ผ SEC06-BP03 Reduce manual management and interactive accessno data
๐Ÿ’ผ SEC06-BP04 Validate software integrityno data
๐Ÿ’ผ SEC06-BP05 Automate compute protectionno data