• diagram
  • Account protection
    • Account shouldn’t get compromised (secure credentials, multi factor credentials, using IAM users)
    • Prevent malicious account / service usage
    • Secure cross-account service usage (big companies often use multiple accounts, and they should work together in a secure way)
    • Compliance & Standardization
      • Single Sign-On (ppl can use same credentials for different things), service config (ppl must follow some guideline/standard), compliance reports
  • Application protection
    • Detect app/software vulnerabilities
    • Detect insecure configurations
    • Investigate security issues & incidents
  • Network protection
    • Detect malicious network traffic (before it arrives in your applications)
    • Protect against DDoS attacks
  • Data protection
    • Encrypt data at rest & in transit
      • both when it’s flowing through the network or stored
    • Protect code secrets
      • In code you use values (and not hard code)
    • Prevent unintended data exposure

Account protection

Compliance & Legal requirements

Application protection

Network protection

Data protection