Skip to main content

Repository → 💼 AWS Well-Architected

💼 Security

  • ID: /frameworks/aws-well-architected/security

Description

Empty...

Similar

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 Application Security8no data
 💼 SEC11-BP01 Train for application securityno data
 💼 SEC11-BP02 Automate testing throughout the development and release lifecycleno data
 💼 SEC11-BP03 Perform regular penetration testingno data
 💼 SEC11-BP04 Conduct code reviewsno data
 💼 SEC11-BP05 Centralize services for packages and dependenciesno data
 💼 SEC11-BP06 Deploy software programmaticallyno data
 💼 SEC11-BP07 Regularly assess security properties of the pipelinesno data
 💼 SEC11-BP08 Build a program that embeds security ownership in workload teamsno data
💼 Data protection3no data
 💼 Data Classification4no data
  💼 SEC07-BP01 Understand your data classification schemeno data
  💼 SEC07-BP02 Apply data protection controls based on data sensitivityno data
  💼 SEC07-BP03 Automate identification and classificationno data
  💼 SEC07-BP04 Define scalable data lifecycle managementno data
 💼 Protecting Data at Rest4no data
  💼 SEC08-BP01 Implement secure key managementno data
  💼 SEC08-BP02 Enforce encryption at restno data
  💼 SEC08-BP03 Automate data at rest protectionno data
  💼 SEC08-BP04 Enforce access controlno data
 💼 Protecting Data in Transit3no data
  💼 SEC09-BP01 Implement secure key and certificate managementno data
  💼 SEC09-BP02 Enforce encryption in transitno data
  💼 SEC09-BP03 Authenticate network communicationsno data
💼 Detection41no data
 💼 SEC04-BP01 Configure service and application loggingno data
 💼 SEC04-BP02 Capture logs, findings, and metrics in standardized locationsno data
 💼 SEC04-BP03 Correlate and enrich security alerts1no data
 💼 SEC04-BP04 Initiate remediation for non-compliant resources1no data
💼 Identity and Access Management2no data
 💼 Identity management6no data
  💼 SEC02-BP01 Use strong sign-in mechanismsno data
  💼 SEC02-BP02 Use temporary credentialsno data
  💼 SEC02-BP03 Store and use secrets securelyno data
  💼 SEC02-BP04 Rely on a centralized identity providerno data
  💼 SEC02-BP05 Audit and rotate credentials periodicallyno data
  💼 SEC02-BP06 Employ user groups and attributesno data
 💼 Permissions management9no data
  💼 SEC03-BP01 Define access requirementsno data
  💼 SEC03-BP02 Grant least privilege accessno data
  💼 SEC03-BP03 Establish emergency access processno data
  💼 SEC03-BP04 Reduce permissions continuouslyno data
  💼 SEC03-BP05 Define permission guardrails for your organizationno data
  💼 SEC03-BP06 Manage access based on lifecycleno data
  💼 SEC03-BP07 Analyze public and cross-account accessno data
  💼 SEC03-BP08 Share resources securely within your organizationno data
  💼 SEC03-BP09 Share resources securely with a third partyno data
💼 Incident Response1no data
 💼 Preparation8no data
  💼 SEC10-BP01 Identify key personnel and external resourcesno data
  💼 SEC10-BP02 Develop incident management plansno data
  💼 SEC10-BP03 Prepare forensic capabilitiesno data
  💼 SEC10-BP04 Develop and test security incident response playbooksno data
  💼 SEC10-BP05 Pre-provision accessno data
  💼 SEC10-BP06 Pre-deploy toolsno data
  💼 SEC10-BP07 Run simulationsno data
  💼 SEC10-BP08 Establish a framework for learning from incidentsno data
💼 Infrastructure protection21no data
 💼 Protecting Compute5no data
  💼 SEC06-BP01 Perform vulnerability managementno data
  💼 SEC06-BP02 Provision compute from hardened imagesno data
  💼 SEC06-BP03 Reduce manual management and interactive accessno data
  💼 SEC06-BP04 Validate software integrityno data
  💼 SEC06-BP05 Automate compute protectionno data
 💼 Protecting Networks41no data
  💼 SEC05-BP01 Create network layersno data
  💼 SEC05-BP02 Control traffic flow within your network layersno data
  💼 SEC05-BP03 Implement inspection-based protection1no data
  💼 SEC05-BP04 Automate network protection1no data
💼 Security Foundations1no data
 💼 Operating your workloads securely8no data
  💼 SEC01-BP01 Separate workloads using accountsno data
  💼 SEC01-BP02 Secure account root user and propertiesno data
  💼 SEC01-BP03 Identify and validate control objectivesno data
  💼 SEC01-BP04 Stay up to date with security threats and recommendationsno data
  💼 SEC01-BP05 Reduce security management scopeno data
  💼 SEC01-BP06 Automate deployment of standard security controlsno data
  💼 SEC01-BP07 Identify threats and prioritize mitigations using a threat modelno data
  💼 SEC01-BP08 Evaluate and implement new security services and features regularlyno data