Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

AWS Well-Architected Framework: Security Pillar

via LinkedIn Learning

Overview

Take a deeper look at the second pillar of the AWS Well-Architected Framework: security.

The AWS Well-Architected Framework helps enterprise architects build more secure, high-performing, resilient, and efficient cloud-based infrastructure for their applications. The Framework comprises five pillars: operational excellence, security, reliability, performance efficiency, and cost optimization. This course takes a deeper look at the second pillar: security. Explore design principles for secure infrastructure, learn how to leverage AWS Identity and Access Management tools, and find out how to protect your organization's AWS credentials. Discover how to conduct effective security audits and put protections into place to secure your infrastructure and your data. Instructor Mark Wilkins also provides guidance on managing an incident response program. Each lesson is designed with Amazon best practices in mind, helping you leverage the Well-Architected Framework tools as well as study topics featured in key AWS certifications.

Syllabus

Introduction
  • Understanding the AWS Well-Architected Framework: The security pillar
  • What you should know
1. Design Principles of the Security Pillar
  • Security pillar overview
  • Design principles
  • Identity and Access Management
  • Demo: IAM security overview
  • Protecting AWS credentials
  • Identify threats: Detective controls
2. Identity and Security
  • AWS detective controls for security
  • Implement an auditing workflow
  • Challenge: Review a CloudTrail event
  • Solution: Review a CloudTrail event
3. Auditing
  • Auditing and notifications
  • Infrastructure protection
  • Key AWS services for infrastucture protection
4. Data and Protection
  • Data protection methods
  • Key AWS services for data protection
  • Protecting your data at rest at AWS
  • Protecting data in transit at AWS
  • Responding to security incidents
  • Managing incident response
  • Demo: Using the Well-Architected tool
Conclusion
  • Next steps

Taught by

Mark Wilkins

Related Courses

Reviews

Start your review of AWS Well-Architected Framework: Security Pillar

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free