⭐ Repository → 💼 AWS Well-Architected → 💼 Security → 💼 Infrastructure protection
💼 Protecting Networks
- ID:
/frameworks/aws-well-architected/security/infrastructure-protection/sec05
Description
Users, both in your workforce and your customers, can be located anywhere. You need to pivot from traditional models of trusting anyone and anything that has access to your network. When you follow the principle of applying security at all layers, you employ a Zero Trust approach. Zero Trust security is a model where application components or microservices are considered discrete from each other and no component or microservice trusts any other.
Similar
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 SEC05-BP01 Create network layers | no data | ||||
💼 SEC05-BP02 Control traffic flow within your network layers | no data | ||||
💼 SEC05-BP03 Implement inspection-based protection | 1 | no data | |||
💼 SEC05-BP04 Automate network protection | 1 | no data |