– AWS Lambda layers
–
Best
practices
for
working
with
AWS
Lambda
functions
– What Is the AWS SAM?
– Systems Manager
– Security Pillar: AWS Well-Architected Framework
Section Page
10
14
Rotate your keys
Centralize
CloudTrail Logs
– CIS Benchmarks
– IAM—Use groups to assign permissions to IAM users
– AWS SSO
– Amazon VPC—Security groups for your VPC
– Amazon VPC
– Secrets Manager
–
best
practices
for
managing
AWS
access
keys
– AWS security audit guidelines
– Guidelines for protecting your AWS account while using
programmatic access
– How to rotate access keys for IAM users
– Amazon EC2 key pairs and Linux instances
9 Limit
security groups
12 Intentional
data policies
– AWS CloudTrail
– Data classification for secure cloud adoption (Whitepaper)
– AWS Certificate Manager
– Code.org Relies on AWS to Teach Next-Generation Computer
Science
– Automated Response and Remediation with AWS Security Hub
– AWS Contact Center—Getting AWS account security event
alerts on your phone with Amazon Connect
– Orchestrating a security incident response with AWS Step
Functions
– AWS Organizations
– AWS Config
– AWS Firewall Manager
– AWS Global Summit New York 2019 Keynote – Steve Randich,
FINRA
– Maximizing features and functionality in AWS CloudTrail
– Creating a trail for an organization
Validate IAM roles
8
Further reading and
key resources
Resource