AWS Well-Architected Framework: Security Pillar

AWS Well-Architected Framework: Security Pillar

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 13m | 156 MB

The AWS Well-Architected Framework helps enterprise architects build more secure, high-performing, resilient, and efficient cloud-based infrastructure for their applications. The Framework comprises five pillars: operational excellence, security, reliability, performance efficiency, and cost optimization. This course takes a deeper look at the second pillar: security. Explore design principles for secure infrastructure, learn how to leverage AWS Identity and Access Management tools, and find out how to protect your organization’s AWS credentials. Discover how to conduct effective security audits and put protections into place to secure your infrastructure and your data. Instructor Mark Wilkins also provides guidance on managing an incident response program. Each lesson is designed with Amazon best practices in mind, helping you leverage the Well-Architected Framework tools as well as study topics featured in key AWS certifications.

Topics include:

  • Design principals
  • Identity and Access Management (IAM)
  • Protecting AWS credentials
  • Identifying threats
  • Auditing security
  • Infrastructure protection
  • Protecting data at rest and in transit
  • Responding to security incidents
  • Managing incident response
Table of Contents

1 Understanding the AWS Well-Architected Framework The security pillar
2 What you should know
3 Security pillar overview
4 Design principles
5 Identity and Access Management
6 Demo IAM security overview
7 Protecting AWS credentials
8 Identify threats Detective controls
9 AWS detective controls for security
10 Implement an auditing workflow
11 Challenge Review a CloudTrail event
12 Solution Review a CloudTrail event
13 Auditing and notifications
14 Infrastructure protection
15 Key AWS services for infrastucture protection
16 Data protection methods
17 Key AWS services for data protection
18 Protecting your data at rest at AWS
19 Protecting data in transit at AWS
20 Responding to security incidents
21 Managing incident response
22 Demo Using the Well-Architected tool
23 Next steps