Skip to main content

⭐ Repository β†’ πŸ’Ό AWS Well-Architected β†’ πŸ’Ό Security β†’ πŸ’Ό Infrastructure protection

πŸ’Ό Protecting Compute

  • ID: /frameworks/aws-well-architected/security/infrastructure-protection/sec06

Description​

Compute resources include EC2 instances, containers, AWS Lambda functions, database services, IoT devices, and more. Each of these compute resource types require different approaches to secure them. However, they do share common strategies that you need to consider: defense in depth, vulnerability management, reduction in attack surface, automation of configuration and operation, and performing actions at a distance. In this section, you will find general guidance for protecting your compute resources for key services. For each AWS service used, it’s important for you to check the specific security recommendations in the service documentation.

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό SEC06-BP01 Perform vulnerability managementno data
πŸ’Ό SEC06-BP02 Provision compute from hardened imagesno data
πŸ’Ό SEC06-BP03 Reduce manual management and interactive accessno data
πŸ’Ό SEC06-BP04 Validate software integrityno data
πŸ’Ό SEC06-BP05 Automate compute protectionno data