Life Sciences

HPC Lens for the AWS Well-Architected Framework

Issue link: https://read.uberflip.com/i/1187300

Contents of this Issue

Navigation

Page 28 of 46

Amazon Web Services – HPC Lens AWS Well-Architected Framework Page 25 • Identity and access management • Detective controls • Infrastructure protection • Data protection • Incident response Before architecting any system, you need to put in place practices that influence security. You will want to control who can do what. In addition, you want to be able to identify security incidents, protect your systems and services, and maintain the confidentiality and integrity of data through data protection. You should have a well-defined and practiced process for responding to security incidents. These tools and techniques are important because they support objectives such as preventing data loss and complying with regulatory obligations. The AWS Shared Responsibility Model enables organizations that adopt the cloud to achieve their security and compliance goals. Because AWS physically secures the infrastructure that supports our cloud services, you can focus on using services to accomplish your goals. The AWS Cloud also provides greater access to security data and an automated approach to responding to security events. The detective controls, infrastructure protection, and incident response categories are vital and well described in the AWS Well-Architected Framework whitepaper. They will not be described in this paper as the practices in the AWS Well-Architected Framework paper do not require modification for HPC workloads. Best Practices Identity and Access Management Identity and access management are key parts of an information security program, ensuring that only authorized and authenticated users are able to access your resources, and only in a manner that is intended. For example, you'll define principals (users, groups, services, and roles that take action in your account), build out policies aligned with these principals, and implement strong credential management. These privilege-management elements form the core concepts of authentication and authorization.

Articles in this issue

Links on this page

view archives of Life Sciences - HPC Lens for the AWS Well-Architected Framework